WO2011163561A1 - Interface of an m2m server with the 3gpp core network - Google Patents

Interface of an m2m server with the 3gpp core network Download PDF

Info

Publication number
WO2011163561A1
WO2011163561A1 PCT/US2011/041767 US2011041767W WO2011163561A1 WO 2011163561 A1 WO2011163561 A1 WO 2011163561A1 US 2011041767 W US2011041767 W US 2011041767W WO 2011163561 A1 WO2011163561 A1 WO 2011163561A1
Authority
WO
WIPO (PCT)
Prior art keywords
machine
procedure
interface
server
data
Prior art date
Application number
PCT/US2011/041767
Other languages
French (fr)
Inventor
Paul L Russell
Ashish Gupta
Nicholas J. Podias
Ana Lucia A. Pinheiro
Jean-Louis Gauvreau
Rocco Di Girolamo
Quang Lu
Debjani Majumder
Original Assignee
Interdigital Patend Holdings, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Interdigital Patend Holdings, Inc. filed Critical Interdigital Patend Holdings, Inc.
Priority to US13/806,450 priority Critical patent/US9736873B2/en
Publication of WO2011163561A1 publication Critical patent/WO2011163561A1/en
Priority to US15/643,411 priority patent/US20170311363A1/en
Priority to US17/184,070 priority patent/US11706598B2/en
Priority to US18/352,408 priority patent/US20240022885A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/10Architectures or entities
    • H04L65/1063Application servers providing network services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/12Setup of transport tunnels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data

Definitions

  • Machine type communication or alternately machine to machine (M2M) communication
  • MTC Machine type communication
  • Respective communication networks may include any number of MTC capable devices.
  • Metering devices or tracking devices may be examples of MTC devices.
  • UE user equipment
  • MS Mobile Station
  • WTRU Wireless Transmit/Receive Unit
  • Machine type communications may use an MTC Server, which may alternately be referred to as an M2M Server.
  • a M2M server may collect data or control information from MTC devices.
  • a M2M server may also send data and other information to M2M devices.
  • MTC devices may communicate via 3 GPP networks such as Long Term Evolution (LTE) networks, Universal Mobile Telecommunication System (UMTS) networks, Worldwide Interoperability for microwave Access (WiMAX) networks, and the like.
  • LTE Long Term Evolution
  • UMTS Universal Mobile Telecommunication System
  • WiMAX Worldwide Interoperability for microwave Access
  • a cellular network node for example a Serving General Packet Radio Service (GPRS) Support Node (SGSN), may communicate with an M2M server.
  • the cellular network node may receive subscriber data and control data.
  • the control data may facilitate a network control procedure and the subscriber data may identify a device involved in the network control procedure.
  • Example network control procedures may include network attach procedures, network detach procedures, authentication procedures, security mode procedures, Packet Data Protocol (PDP) context procedures, location area update procedures, routing area update procedures, tracking area update procedures, or the like.
  • PDP Packet Data Protocol
  • the cellular network node may determine that the device involved in the network control procedure is a machine to machine device based on the subscriber data.
  • the subscriber data may include an Access Point Name (APN), and the cellular network node may determine that a device is an M2M device based on the APN.
  • the cellular network node may also send the control data to a machine to machine server using a message sent via a dedicated interface with the machine to machine server.
  • the dedicated interface may be called a GM2M interface.
  • the dedicated interface may be a logical interface internal to the network node.
  • the M2M server may request control data such as the current status of a M2M device.
  • the M2M server may request control data such as an attach status, a routing area status, security mode status, authentication status, PDP context status, and/or the like.
  • the control data may be based on mobility control information or connection control information.
  • the request for control data may be sent to a cellular network node via the GM2M interface.
  • the cellular network node may initiate a network control procedure based on the request from the M2M server.
  • the cellular network node may send control information from the network control procedure to the M2M device via the GM2M interface.
  • FIG. 1 A is a system diagram of an example communications system in which one or more disclosed embodiments may be implemented
  • FIG. IB is a system diagram of an example wireless transmit/receive unit (WTRU) that may be used within the communications system illustrated in FIG. 1A;
  • WTRU wireless transmit/receive unit
  • FIG. 1C is a system diagram of an example radio access network and an example core network that may be used within the communications system illustrated in FIG. 1A;
  • FIG. ID is a system diagram of an another example radio access network and an another example core network that may be used within the communications system illustrated in FIG. 1A;
  • FIG. IE is a system diagram of an another example radio access network and an another example core network that may be used within the communications system illustrated in FIG. 1A;
  • FIG. 2 illustrates an example embodiment of a 3GPP network including a integrated M2M server
  • FIG. 3 illustrates an example communication protocol stack for communication of a GM2M interface
  • FIG. 4 illustrates an example M2M device attach procedure in accordance with an embodiment
  • FIG. 5 illustrates an example M2M device routing area update procedure in accordance with an embodiment
  • FIG. 6 illustrates an example M2M device initiated Packet Data Protocol (PDP) context activation procedure in accordance with an embodiment
  • FIG. 7 illustrates an example M2M device detach procedure in accordance with an embodiment
  • FIG. 8 illustrates an example authentication and cyphering procedure in accordance with an embodiment
  • FIG. 9 illustrates an example security mode procedure in accordance with an embodiment
  • FIG. 10 illustrates an example location reporting control procedure in accordance with an embodiment
  • FIG. 1 1 illustrates an example network initiated PDP context activation procedure in accordance with an embodiment.
  • FIG. 1 A is a diagram of an example communications system 100 in which one or more disclosed embodiments may be implemented.
  • the communications system 100 may be a multiple access system that provides content, such as voice, data, video, messaging, broadcast, etc., to multiple wireless users.
  • the communications system 100 may enable multiple wireless users to access such content through the sharing of system resources, including wireless bandwidth.
  • the communications systems 100 may employ one or more channel access methods, such as code division multiple access (CDMA), time division multiple access (TDMA), frequency division multiple access (FDMA), orthogonal FDMA (OFDMA), single- carrier FDMA (SC-FDMA), and the like.
  • CDMA code division multiple access
  • TDMA time division multiple access
  • FDMA frequency division multiple access
  • OFDMA orthogonal FDMA
  • SC-FDMA single- carrier FDMA
  • the communications system 100 may include wireless transmit/receive units (WTRUs) 102a, 102b, 102c, and/or 102d (which generally or collectively may be referred to as WTRU 102), a radio access network (RAN) 103/104/105, a core network 106/107/109, a public switched telephone network (PSTN) 108, the Internet 1 10, and other networks 1 12, though it will be appreciated that the disclosed embodiments contemplate any number of WTRUs, base stations, networks, and/or network elements.
  • Each of the WTRUs 102a, 102b, 102c, 102d may be any type of device configured to operate and/or communicate in a wireless environment.
  • the WTRUs 102a, 102b, 102c, 102d may be configured to transmit and/or receive wireless signals and may include user equipment (UE), a mobile station, a fixed or mobile subscriber unit, a pager, a cellular telephone, a personal digital assistant (PDA), a smartphone, a laptop, a netbook, a personal computer, a wireless sensor, consumer electronics, and the like.
  • UE user equipment
  • PDA personal digital assistant
  • smartphone a laptop
  • netbook a personal computer
  • a wireless sensor consumer electronics, and the like.
  • the communications systems 100 may also include a base station 114a and a base station 114b.
  • Each of the base stations 1 14a, 114b may be any type of device configured to wirelessly interface with at least one of the WTRUs 102a, 102b, 102c, 102d to facilitate access to one or more communication networks, such as the core network 106/107/109, the Internet 1 10, and/or the networks 112.
  • the base stations 114a, 114b may be a base transceiver station (BTS), a Node-B, an eNode B, a Home Node B, a Home eNode B, a site controller, an access point (AP), a wireless router, and the like. While the base stations 1 14a, 1 14b are each depicted as a single element, it will be appreciated that the base stations 1 14a, 1 14b may include any number of interconnected base stations and/or network elements.
  • the base station 114a may be part of the RAN 103/104/105, which may also include other base stations and/or network elements (not shown), such as a base station controller
  • the base station 114a and/or the base station 1 14b may be configured to transmit and/or receive wireless signals within a particular geographic region, which may be referred to as a cell (not shown).
  • the cell may further be divided into cell sectors.
  • the cell associated with the base station 114a may be divided into three sectors.
  • the base station 114a may include three transceivers, i.e., one for each sector of the cell.
  • the base station 1 14a may employ multiple-input multiple output (MIMO) technology and, therefore, may utilize multiple transceivers for each sector of the cell.
  • MIMO multiple-input multiple output
  • the base stations 114a, 1 14b may communicate with one or more of the WTRUs 102a, 102b, 102c, 102d over an air interface 115/116/1 17, which may be any suitable wireless communication link (e.g., radio frequency (RF), microwave, infrared (IR), ultraviolet (UV), visible light, etc.).
  • the air interface 115/116/1 17 may be established using any suitable radio access technology (RAT).
  • RAT radio access technology
  • the communications system 100 may be a multiple access system and may employ one or more channel access schemes, such as CDMA, TDMA, FDMA, OFDMA, SC-FDMA, and the like.
  • the base station 114a in the RAN 103/104/105 and the WTRUs 102a, 102b, 102c may implement a radio technology such as Universal Mobile Telecommunications System (UMTS) Terrestrial Radio Access (UTRA), which may establish the air interface 1 15/116/1 17 using wideband CDMA (WCDMA).
  • UMTS Universal Mobile Telecommunications System
  • UTRA Universal Mobile Telecommunications System
  • WCDMA wideband CDMA
  • WCDMA may include communication protocols such as High-Speed Packet Access (HSPA) and/or Evolved HSPA (HSPA+).
  • HSPA may include High-Speed Downlink Packet Access (HSDPA) and/or High-Speed Uplink Packet Access (HSUPA).
  • HSPA High-Speed Packet Access
  • HSDPA High-Speed Downlink Packet Access
  • HSUPA High-Speed Uplink Packet Access
  • the base station 1 14a and the WTRUs 102a, 102b, 102c may implement a radio technology such as Evolved UMTS Terrestrial Radio Access (E-UTRA), which may establish the air interface 115/116/1 17 using Long Term Evolution (LTE) and/or LTE-Advanced (LTE- A).
  • E-UTRA Evolved UMTS Terrestrial Radio Access
  • LTE Long Term Evolution
  • LTE-A LTE-Advanced
  • the base station 114a and the WTRUs 102a, 102b, 102c may implement radio technologies such as IEEE 802.16 (i.e., Worldwide Interoperability for Microwave Access (WiMAX)), CDMA2000, CDMA2000 IX, CDMA2000 EV-DO, Interim Standard 2000 (IS-2000), Interim Standard 95 (IS-95), Interim Standard 856 (IS-856), Global System for Mobile communications (GSM), Enhanced Data rates for GSM Evolution (EDGE), GSM EDGE (GERAN), and the like.
  • IEEE 802.16 i.e., Worldwide Interoperability for Microwave Access (WiMAX)
  • CDMA2000, CDMA2000 IX, CDMA2000 EV-DO Code Division Multiple Access 2000
  • IS-95 Interim Standard 95
  • IS-856 Interim Standard 856
  • GSM Global System for Mobile communications
  • GSM Global System for Mobile communications
  • EDGE Enhanced Data rates for GSM Evolution
  • GERAN GSM EDGERAN
  • the base station 114b in FIG. 1A may be a wireless router, Home Node B,
  • the base station 1 14b and the WTRUs 102c, 102d may implement a radio technology such as IEEE 802.11 to establish a wireless local area network (WLAN).
  • the base station 1 14b and the WTRUs 102c, 102d may implement a radio technology such as IEEE 802.15 to establish a wireless personal area network (WPAN).
  • WLAN wireless local area network
  • WPAN wireless personal area network
  • the base station 1 14b and the WTRUs 102c, 102d may utilize a cellular-based RAT (e.g., WCDMA, CDMA2000, GSM, LTE, LTE-A, etc.) to establish a picocell or femtocell.
  • a cellular-based RAT e.g., WCDMA, CDMA2000, GSM, LTE, LTE-A, etc.
  • the base station 114b may have a direct connection to the Internet 110.
  • the base station 1 14b may not be required to access the Internet 1 10 via the core network 106/107/109.
  • the RAN 103/104/105 may be in communication with the core network 106/107/109, which may be any type of network configured to provide voice, data, applications, and/or voice over internet protocol (VoIP) services to one or more of the WTRUs 102a, 102b, 102c, 102d.
  • the core network 106/107/109 may provide call control, billing services, mobile location-based services, pre-paid calling, Internet connectivity, video distribution, etc., and/or perform high-level security functions, such as user authentication.
  • VoIP voice over internet protocol
  • the RAN 103/104/105 and/or the core network 106/107/109 may be in direct or indirect communication with other RANs that employ the same RAT as the RAN 103/104/105 or a different RAT.
  • the core network 106/107/109 may also be in communication with another RAN (not shown) employing a GSM radio technology.
  • the core network 106/107/109 may also serve as a gateway for the WTRUs 102a, 102b, 102c, 102d to access the PSTN 108, the Internet 1 10, and/or other networks 1 12.
  • the PSTN 108 may include circuit-switched telephone networks that provide plain old telephone service (POTS).
  • POTS plain old telephone service
  • the Internet 1 10 may include a global system of interconnected computer networks and devices that use common communication protocols, such as the transmission control protocol (TCP), user datagram protocol (UDP) and the internet protocol (IP) in the TCP/IP internet protocol suite.
  • the networks 1 12 may include wired or wireless
  • the networks 1 12 may include another core network connected to one or more RANs, which may employ the same RAT as the RAN 103/104/105 or a different RAT.
  • Some or all of the WTRUs 102a, 102b, 102c, 102d in the communications system 100 may include multi-mode capabilities, i.e., the WTRUs 102a, 102b, 102c, 102d may include multiple transceivers for communicating with different wireless networks over different wireless links.
  • the WTRU 102c shown in FIG. 1A may be configured to communicate with the base station 114a, which may employ a cellular-based radio technology, and with the base station 1 14b, which may employ an IEEE 802 radio technology.
  • FIG. IB is a system diagram of an example WTRU 102.
  • the WTRU 102 may include a processor 118, a transceiver 120, a transmit/receive element 122, a speaker/microphone 124, a keypad 126, a display/touchpad 128, non-removable memory 130, removable memory 132, a power source 134, a global positioning system (GPS) chipset 136, and other peripherals 138.
  • GPS global positioning system
  • the base stations 114a and 114b, and/or the nodes that base stations 114a and 114b may represent, such as but not limited to transceiver station (BTS), a Node-B, a site controller, an access point (AP), a home node-B, an evolved home node-B (eNodeB), a home evolved node-B (HeNB), a home evolved node-B gateway, and proxy nodes, among others, may include some or all of the elements depicted in FIG. IB and described herein.
  • BTS transceiver station
  • Node-B a Node-B
  • AP access point
  • eNodeB evolved home node-B
  • HeNB home evolved node-B gateway
  • proxy nodes among others, may include some or all of the elements depicted in FIG. IB and described herein.
  • the processor 118 may be a general purpose processor, a special purpose processor, a conventional processor, a digital signal processor (DSP), a plurality of
  • the processor 1 18 may perform signal coding, data processing, power control, input/output processing, and/or any other functionality that enables the WTRU 102 to operate in a wireless environment.
  • the processor 1 18 may be coupled to the transceiver 120, which may be coupled to the transmit/receive element 122. While FIG. IB depicts the processor 1 18 and the transceiver 120 as separate components, it will be appreciated that the processor 118 and the transceiver 120 may be integrated together in an electronic package or chip.
  • the transmit/receive element 122 may be configured to transmit signals to, or receive signals from, a base station (e.g., the base station 1 14a) over the air interface
  • the transmit/receive element 122 may be an antenna configured to transmit and/or receive RF signals.
  • the transmit/receive element 122 may be an emitter/detector configured to transmit and/or receive IR, UV, or visible light signals, for example.
  • the transmit/receive element 122 may be configured to transmit and receive both RF and light signals. It will be appreciated that the transmit/receive element 122 may be configured to transmit and/or receive any combination of wireless signals.
  • the transmit/receive element 122 is depicted in FIG. IB as a single element, the WTRU 102 may include any number of transmit/receive elements 122.
  • the WTRU 102 may employ MIMO technology.
  • the WTRU 102 may include two or more transmit/receive elements 122 (e.g., multiple antennas) for transmitting and receiving wireless signals over the air interface 115/116/1 17.
  • the transceiver 120 may be configured to modulate the signals that are to be transmitted by the transmit/receive element 122 and to demodulate the signals that are received by the transmit/receive element 122.
  • the WTRU 102 may have multi-mode capabilities.
  • the transceiver 120 may include multiple transceivers for enabling the WTRU 102 to communicate via multiple RATs, such as UTRA and IEEE 802.11, for example.
  • the processor 118 of the WTRU 102 may be coupled to, and may receive user input data from, the speaker/microphone 124, the keypad 126, and/or the display/touchpad 128 (e.g., a liquid crystal display (LCD) display unit or organic light-emitting diode (OLED) display unit).
  • the processor 118 may also output user data to the speaker/microphone 124, the keypad 126, and/or the display/touchpad 128.
  • the processor 1 18 may access information from, and store data in, any type of suitable memory, such as the non-removable memory 130 and/or the removable memory 132.
  • the non-removable memory 130 may include random- access memory (RAM), read-only memory (ROM), a hard disk, or any other type of memory storage device.
  • the removable memory 132 may include a subscriber identity module (SIM) card, a memory stick, a secure digital (SD) memory card, and the like.
  • SIM subscriber identity module
  • SD secure digital
  • the processor 118 may access information from, and store data in, memory that is not physically located on the WTRU 102, such as on a server or a home computer (not shown).
  • the processor 118 may receive power from the power source 134, and may be configured to distribute and/or control the power to the other components in the WTRU 102.
  • the power source 134 may be any suitable device for powering the WTRU 102.
  • the power source 134 may include one or more dry cell batteries (e.g., nickel-cadmium ( iCd), nickel-zinc (NiZn), nickel metal hydride (NiMH), lithium-ion (Li-ion), etc.), solar cells, fuel cells, and the like.
  • the processor 118 may also be coupled to the GPS chipset 136, which may be configured to provide location information (e.g., longitude and latitude) regarding the current location of the WTRU 102. In addition to, or in lieu of, the information from the GPS chipset
  • the WTRU 102 may receive location information over the air interface 1 15/1 16/1 17 from a base station (e.g., base stations 1 14a, 114b) and/or determine its location based on the timing of the signals being received from two or more nearby base stations. It will be appreciated that the WTRU 102 may acquire location information by way of any suitable location-determination method while remaining consistent with an embodiment.
  • a base station e.g., base stations 1 14a, 114b
  • the WTRU 102 may acquire location information by way of any suitable location-determination method while remaining consistent with an embodiment.
  • the processor 118 may further be coupled to other peripherals 138, which may include one or more software and/or hardware modules that provide additional features, functionality and/or wired or wireless connectivity.
  • the peripherals 138 may include an accelerometer, an e-compass, a satellite transceiver, a digital camera (for photographs or video), a universal serial bus (USB) port, a vibration device, a television transceiver, a hands free headset, a Bluetooth® module, a frequency modulated (FM) radio unit, a digital music player, a media player, a video game player module, an Internet browser, and the like.
  • the peripherals 138 may include an accelerometer, an e-compass, a satellite transceiver, a digital camera (for photographs or video), a universal serial bus (USB) port, a vibration device, a television transceiver, a hands free headset, a Bluetooth® module, a frequency modulated (FM) radio unit, a digital music player, a media player, a video game player
  • FIG. 1C is a system diagram of the RAN 103 and the core network 106 according to an embodiment.
  • the RAN 103 may employ a UTRA radio technology to communicate with the WTRUs 102a, 102b, 102c over the air interface 1 15.
  • the RAN 103 may also be in communication with the core network 106.
  • the RAN 103 may include Node-Bs 140a, 140b, 140c, which may each include one or more transceivers for communicating with the WTRUs 102a, 102b, 102c over the air interface 115.
  • the Node-Bs 140a, 140b, 140c may each be associated with a particular cell (not shown) within the RAN 103.
  • the RAN 103 may also include RNCs 142a, 142b. It will be appreciated that the RAN 103 may include any number of Node-Bs and RNCs while remaining consistent with an embodiment.
  • the Node-Bs 140a, 140b may be in communication with the RNC 142a. Additionally, the Node-B 140c may be in communication with the RNC142b.
  • the Node-Bs 140a, 140b, 140c may communicate with the respective RNCs 142a, 142b via an Iub interface.
  • the RNCs 142a, 142b may be in communication with one another via an Iur interface.
  • Each of the RNCs 142a, 142b may be configured to control the respective Node-Bs 140a, 140b, 140c to which it is connected.
  • each of the RNCs 142a, 142b may be configured to carry out or support other functionality, such as outer loop power control, load control, admission control, packet scheduling, handover control, macrodiversity, security functions, data encryption, and the like.
  • the core network 106 shown in FIG. 1C may include a media gateway (MGW) 144, a mobile switching center (MSC) 146, a serving GPRS support node (SGSN) 148, and/or a gateway GPRS support node (GGSN) 150. While each of the foregoing elements are depicted as part of the core network 106, it will be appreciated that any one of these elements may be owned and/or operated by an entity other than the core network operator.
  • the RNC 142a in the RAN 103 may be connected to the MSC 146 in the core network 106 via an IuCS interface.
  • the MSC 146 may be connected to the MGW 144.
  • the MSC 146 and the MGW 144 may provide the WTRUs 102a, 102b, 102c with access to circuit- switched networks, such as the PSTN 108, to facilitate communications between the WTRUs 102a, 102b, 102c and traditional land-line communications devices.
  • circuit- switched networks such as the PSTN 108
  • the RNC 142a in the RAN 103 may also be connected to the SGSN 148 in the core network 106 via an IuPS interface.
  • the SGSN 148 may be connected to the GGSN 150.
  • the SGSN 148 and the GGSN 150 may provide the WTRUs 102a, 102b, 102c with access to packet-switched networks, such as the Internet 1 10, to facilitate communications between and the WTRUs 102a, 102b, 102c and IP-enabled devices.
  • the core network 106 may also be connected to the networks 1 12, which may include other wired or wireless networks that are owned and/or operated by other service providers.
  • FIG. ID is a system diagram of the RAN 104 and the core network 107 according to an embodiment.
  • the RAN 104 may employ an E-UTRA radio technology to communicate with the WTRUs 102a, 102b, 102c over the air interface 1 16.
  • the RAN 104 may also be in communication with the core network 107.
  • the RAN 104 may include eNode-Bs 160a, 160b, 160c, though it will be appreciated that the RAN 104 may include any number of eNode-Bs while remaining consistent with an embodiment.
  • the eNode-Bs 160a, 160b, 160c may each include one or more transceivers for communicating with the WTRUs 102a, 102b, 102c over the air interface 116.
  • the eNode-Bs 160a, 160b, 160c may implement MIMO technology.
  • the eNode-B 160a for example, may use multiple antennas to transmit wireless signals to, and receive wireless signals from, the WTRU 102a.
  • Each of the eNode-Bs 160a, 160b, 160c may be associated with a particular cell (not shown) and may be configured to handle radio resource management decisions, handover decisions, scheduling of users in the uplink and/or downlink, and the like. As shown in FIG. ID, the eNode-Bs 160a, 160b, 160c may communicate with one another over an X2 interface.
  • the core network 107 shown in FIG. ID may include a mobility management gateway (MME) 162, a serving gateway 164, and a packet data network (PDN) gateway 166. While each of the foregoing elements are depicted as part of the core network 107, it will be appreciated that any one of these elements may be owned and/or operated by an entity other than the core network operator.
  • the MME 162 may be connected to each of the eNode-Bs 160a, 160b, 160c in the RAN 104 via an SI interface and may serve as a control node. For example, the MME 162 may be responsible for authenticating users of the WTRUs 102a, 102b, 102c, bearer
  • the MME 162 may also provide a control plane function for switching between the RAN 104 and other RANs (not shown) that employ other radio technologies, such as GSM or WCDMA.
  • the serving gateway 164 may be connected to each of the eNode-Bs 160a, 160b, 160c in the RAN 104 via the SI interface.
  • the serving gateway 164 may generally route and forward user data packets to/from the WTRUs 102a, 102b, 102c.
  • the serving gateway 164 may also perform other functions, such as anchoring user planes during inter-eNode B handovers, triggering paging when downlink data is available for the WTRUs 102a, 102b, 102c, managing and storing contexts of the WTRUs 102a, 102b, 102c, and the like.
  • the serving gateway 164 may also be connected to the PDN gateway 166, which may provide the WTRUs 102a, 102b, 102c with access to packet-switched networks, such as the Internet 1 10, to facilitate communications between the WTRUs 102a, 102b, 102c and IP- enabled devices.
  • the PDN gateway 166 may provide the WTRUs 102a, 102b, 102c with access to packet-switched networks, such as the Internet 1 10, to facilitate communications between the WTRUs 102a, 102b, 102c and IP- enabled devices.
  • the core network 107 may facilitate communications with other networks.
  • the core network 107 may provide the WTRUs 102a, 102b, 102c with access to circuit- switched networks, such as the PSTN 108, to facilitate communications between the WTRUs 102a, 102b, 102c and traditional land-line communications devices.
  • the core network 107 may include, or may communicate with, an IP gateway (e.g., an IP multimedia subsystem (IMS) server) that serves as an interface between the core network 107 and the PSTN 108.
  • IMS IP multimedia subsystem
  • the core network 107 may provide the WTRUs 102a, 102b, 102c with access to the networks 112, which may include other wired or wireless networks that are owned and/or operated by other service providers.
  • FIG. IE is a system diagram of the RAN 105 and the core network 109 according to an embodiment.
  • the RAN 105 may be an access service network (ASN) that employs IEEE 802.16 radio technology to communicate with the WTRUs 102a, 102b, 102c over the air interface 117.
  • ASN access service network
  • the communication links between the different functional entities of the WTRUs 102a, 102b, 102c, the RAN 105, and the core network 109 may be defined as reference points.
  • the RAN 105 may include base stations 180a, 180b, 180c, and an ASN gateway 182, though it will be appreciated that the RAN 105 may include any number of base stations and ASN gateways while remaining consistent with an embodiment.
  • the base stations 180a, 180b, 180c may each be associated with a particular cell (not shown) in the RAN 105 and may each include one or more transceivers for communicating with the WTRUs 102a, 102b, 102c over the air interface 117.
  • the base stations 180a, 180b, 180c may implement MIMO technology.
  • the base station 180a for example, may use multiple antennas to transmit wireless signals to, and receive wireless signals from, the WTRU 102a.
  • the base stations 180a, 180b, 180c may also provide mobility management functions, such as handoff triggering, tunnel establishment, radio resource management, traffic classification, quality of service (QoS) policy enforcement, and the like.
  • the ASN gateway 182 may serve as a traffic aggregation point and may be responsible for paging, caching of subscriber profiles, routing to the core network 109, and the like.
  • the air interface 117 between the WTRUs 102a, 102b, 102c and the RAN 105 may be defined as an Rl reference point that implements the IEEE 802.16 specification.
  • each of the WTRUs 102a, 102b, 102c may establish a logical interface (not shown) with the core network 109.
  • the logical interface between the WTRUs 102a, 102b, 102c and the core network 109 may be defined as an R2 reference point, which may be used for
  • the communication link between each of the base stations 180a, 180b, 180c may be defined as an R8 reference point that includes protocols for facilitating WTRU handovers and the transfer of data between base stations.
  • the communication link between the base stations 180a, 180b, 180c and the ASN gateway 182 may be defined as an R6 reference point.
  • the R6 reference point may include protocols for facilitating mobility management based on mobility events associated with each of the WTRUs 102a, 102b, 102c.
  • the RAN 105 may be connected to the core network 109.
  • the communication link between the RAN 105 and the core network 109 may defined as an R3 reference point that includes protocols for facilitating data transfer and mobility management capabilities, for example.
  • the core network 109 may include a mobile IP home agent (MIP-HA) 184, an authentication, authorization, accounting (AAA) server 186, and a gateway 188. While each of the foregoing elements are depicted as part of the core network 109, it will be appreciated that any one of these elements may be owned and/or operated by an entity other than the core network operator.
  • MIP-HA mobile IP home agent
  • AAA authentication, authorization, accounting
  • the MIP-HA may be responsible for IP address management, and may enable the WTRUs 102a, 102b, 102c to roam between different ASNs and/or different core networks.
  • the MIP-HA 184 may provide the WTRUs 102a, 102b, 102c with access to packet-switched networks, such as the Internet 1 10, to facilitate communications between the WTRUs 102a, 102b, 102c and IP-enabled devices.
  • the AAA server 186 may be responsible for user authentication and for supporting user services.
  • the gateway 188 may facilitate interworking with other networks. For example, the gateway 188 may provide the WTRUs 102a, 102b, 102c with access to circuit-switched networks, such as the PSTN 108, to facilitate communications between the WTRUs 102a, 102b, 102c and traditional land-line communications devices. In addition, the gateway 188 may provide the WTRUs 102a, 102b, 102c with access to the networks 1 12, which may include other wired or wireless networks that are owned and/or operated by other service providers.
  • the RAN 105 may be connected to other ASNs and the core network 109 may be connected to other core networks.
  • the communication link between the RAN 105 the other ASNs may be defined as an R4 reference point, which may include protocols for coordinating the mobility of the WTRUs 102a, 102b, 102c between the RAN 105 and the other ASNs.
  • the communication link between the core network 109 and the other core networks may be defined as an R5 reference, which may include protocols for facilitating interworking between home core networks and visited core networks.
  • M2M Servers may provide M2M services for M2M devices.
  • an M2M server may send data to and receive data from an M2M device.
  • the M2M server may collect control information or data regarding the M2M device that is generated or maintained by the 3 GPP Core Network.
  • Example control data may include, but is not limited to, mobility information (e.g., routing area information, location area information, tracking area information, etc.), connection information (e.g., PDP context information, IP address, other addressing information, network attach/detach data, etc.), security information (e.g.,
  • authentication information e.g., authentication information, cyphering information, security mode information, etc.
  • security mode information e.g., authentication information, password, password, etc.
  • any other information maintained or generated by a 3 GPP core network e.g., authentication information, cyphering information, security mode information, etc.
  • a connection may be established between an M2M server and the cellular network node.
  • the cellular network node may be a SGSN.
  • the connection between the cellular network node and the M2M server may be a dedicated interface.
  • the dedicated interface may be referred to herein as a GM2M interface.
  • the GM2M interface may include a defined communications protocol stack. Control and/or data signals from an M2M device and an M2M server may be communicated via the dedicated interface.
  • the cellular network node may determine that a device is a machine to machine device based on subscriber data.
  • the subscriber data may include an Access Point Name (APN), and the cellular network node may determine that a device is an M2M device based on the APN.
  • the APN may be received from another cellular network node, for example a HLR.
  • Subscriber data may be other data which may be used to identify a machine to machine device. For example, if the cellular network node has communicated with the M2M device in the past, it may store an indication that identifies the device as an M2M device. When the cellular network node receives subscriber data for the M2M device, such as a device identification or address, the indication may be used to determine that the device is an M2M device.
  • the M2M server may request control data such as the current status of a M2M device.
  • the M2M server may request control data such as an attach status, a routing area status, security mode status, authentication status, PDP context status, and/or the like.
  • the control data may be based on mobility control information or connection control information.
  • the request for control data may be sent to a cellular network node via the GM2M interface.
  • the cellular network node may initiate a network control procedure based on the request from the M2M server.
  • the cellular network node may send control information from the network control procedure to the M2M device via the GM2M interface.
  • the systems and methods disclosed herein may be described in relation to connecting an M2M Server to the SGSN of the 3 GPP Core Network. However, the systems and methods disclosed herein may be applicable to other connection implementations. As such, use of the concepts described herein may not be limited to connections relating to the SGSN of the 3 GPP Core Network.
  • the interface may be between the M2M server and a GGSN.
  • the dedicated interface may be between the M2M server and a MME in an LTE network.
  • an SGSN may include one or more logical interfaces for communication with various network nodes and entities.
  • Exemplary interfaces with the SGSN may include one or more of the following:
  • CGF Charging Gateway Function
  • SMS Short Message Service
  • MSC Mobile Switching Center
  • GSN Gn - SGSNO GGSN
  • HLR Home Location Register
  • VLR Visitor Location register
  • FIG. 2 illustrates an exemplary 3 GPP architecture including an M2M server 236 in accordance with an embodiment.
  • M2M Server 236 (which may be referred to as A Machine Type Communication (MTC) Server) may be integrated with a 3GPP network.
  • M2M server 236 may include an interface with SGSN 226. The interface may be referred to as a GM2M interface.
  • MTC Machine Type Communication
  • FIG. 2 illustrates how various network nodes and connected devices may communicate in a 3GPP network.
  • M2M Device/GW 202 may be a WTRU capable of connecting to a 3GPP network.
  • M2M Device/GW 202 may be a M2M device, such as a sensor reporting data.
  • M2M Device/GW 202 may be a gateway collecting information from various M2M devices in order to relay data to the 3 GPP network.
  • M2M Device/GW 202 may include Generic Communication (xGC) interface 204 and Service
  • xGC 204 may be a communications interface that allows M2M
  • SC 206 may be may provide service functions that may be shared by different applications or devices.
  • SC 206 may provide application enablement, reachability/addressing/repository functionality for applications, remote entity management, security, data retention, transaction management, compensation brokerage (charging), and/or act as an interworking proxy.
  • SC 206 may provide other European
  • M2M Device/GW 202 may also include WiFi interface 208, which may allow M2M Device/GW 202 to connect to WiFi networks.
  • M2M Device/GW 202 may also include UMTS interface 210, which may facilitate M2M Device/GW 202 to connect to UMTS networks.
  • the UMTS interface is exemplary, and M2M Device/GW 202 may also include interfaces for LTE networks, WiMax networks and the like.
  • M2M Device/GW 202 may be in communication with Femto Access Point (FAP) 212.
  • FAP 212 may be part of a radio access network (RAN) which provides M2M Device/GW 202 with radio access to a 3GPP network.
  • FAP 212 may include a Home NodeB or may include a traditional NodeB.
  • FAP 212 may include other nodes which facilitate radio access to a 3 GPP network.
  • FAP 212 may include NodeB 214 and Radio Network Controller 216.
  • NodeB 214 and Radio Network Controller 216 may be part of a RAN for a UMTS network.
  • NodeB 214 may communicate with RNC 216 via an Iub interface.
  • FAP 212 may communicate with Home NodeB (HNB) Gateway (GW) 218, for example via an Iuh interface.
  • HNB GW 218 may act as a gateway between FAP 212 and the core network (CN) of a 3 GPP system.
  • CN core network
  • HNB GW 218 may communicate with a 3 GPP CN via an Iu interface.
  • HNB GW 218 may communicate with Circuit-Switched CN 220 via an lues interface.
  • HNB GW 218 may communicate with Packet-Switched CN 224 via an Iups interface.
  • CS CN 220 and PS CN 224 may be logical partitions of a 3 GPP CN.
  • CS CN 229 may include MSC/VLR 222.
  • MSC/VLR 222 may provide support for CS functionality for M2M Device/GW 202.
  • PS CN 224 may include SGSN 226.
  • SGSN 226 may facilitate the delivery of data packets to and from WTRUs within a geographical or network service area. SGSN 226 may route and transfer packets, provide mobility management functionality, provide logical link management, authenticate WTRUs, provide fee charging services (such as billing user data), and the like.
  • PSN CN 224 may include GGSN 228. GGSN 228 may facilitate operative
  • GGSN 228 may communicate with Packet Data Network (PDN) 232, for example via a Gi interface.
  • PDN 232 may be any packet-based communication network.
  • PDN 232 may provide M2M Network Application (App) 234 with a packet-based communication link for communication with PS CN 224.
  • M2M Network App 234 may be an application being executed by a computing device which is meant to communicate with M2M Device/GW 202 and/or M2M Server 236.
  • M2M Network App 234 may communicate with PDN 232 via an mla interface, and may use various communication protocols such as a Constrained Application Protocol (CoAp), a Hypertext Transfer Protocol (HTTP), a Session Initiation Protocol (SIP), and/or the like.
  • PS CN 224 may also include HLR 230, which may store location information and user profile information for devices in communication with the 3 GPP network.
  • the user profile information may be an example of subscriber data.
  • M2M Server 236 may include Network Generic Communication (NGC) interface 240 and Network Applications Enablement (NAE) function 238.
  • NTC Network Generic Communication
  • NAE 238 may serve a a contact point for M2M applications within the network.
  • M2M Server 236 may be part of an operator owned network.
  • GM2M may be a logical interface between SGSN 226 and M2M Server 236. Control data and/or user data from M2M
  • Device/GW 202 may be communicated between SGSN 226 and M2M Server 236 via GM2M.
  • control data from M2M Device/GW 202 may be communicated from SGSN 226 to M2M Server 236, while user data from M2M Device/GW 202 may be communicated from SGSN 226 to M2M Server 236 via GGSN 228.
  • control data may be sent from M2M Device/GW 202 to FAP 212 via UMTS interface 210.
  • the control data may be routed from FAP 212 to HNB GW 218.
  • the control data may be routed from HNB GW 218 to SGSN 226.
  • SGSN 226 may then communicate the control data to M2M Server 236 via the GM2M interface.
  • user data from M2M Device/GW 202 may be routed from to SGSN 226 in a manner similar to control data. However, in this example user data may be routed from SGSN 226 to GGSN 228, for example, via the Gn interface. GGSN 228 may then route the user data from M2M Device/GW 202 to M2M server 236, for example via an mla interface. The user data may be received by M2M Server via NAE 238, NGC 240 or another interface.
  • the GM2M interface may be for the control path (e.g., registration, security functions, authentication, etc.).
  • SGSN 226 may perform user registration with M2M Server 236 without communicating through other network nodes or entities.
  • the direct communication may provide for more efficient signaling within the CN, for example during an Attach procedure. Signaling of attach, authentication, and authorization may be performed via the GM2M interface, and other signaling and data path communications may be performed via the Gi interface.
  • M2M Server 236 may receive control information via the GM2M interface without M2M Device/GW 202 establishing a PDP Context Activation and/or registering with M2M Server 236.
  • a PDP context between the network and a device may have been established.
  • An interface between GGSN 228 and M2M Server 236 may also be established.
  • the interface between GGSN 228 and M2M Server 236 may be utilized for data (payload) traffic.
  • Procedures may be defined to facilitate connection of an M2M Server to a 3GPP network.
  • an M2M server may be connected with the SGSN of the 3GPP Core Network, e.g., on the GM2M Interface.
  • charging and billing functions of the M2M server and or 3GPP network may be integrated via the GM2M interface.
  • signaling overhead may be reduced by allowing communication directly between the SGSN and the M2M Server rather than routing all communications through the GGSN.
  • An M2M Server that is integrated within a 3GPP core network may
  • the device specific information may be control information.
  • device identity information such as an
  • IMSI International mobile Subscriber Identity
  • IMSI International Mobile Subscriber Identity
  • IMEI Packet Temporary Mobile Subscriber Identity
  • P-TMSI Packet Temporary Mobile Subscriber Identity
  • GM2M interface Location related information such as routing area (RA) information, location area (LA) information, tracking area (TA) information, and/or the like may be communicated via the GM2M interface.
  • Security related information such integrity key, ciphering keys,, and/or the like may be communicated via the GM2M interface.
  • PDP context related information such as IP addressed, PDP type, and/or the like may be communicated via the GM2M interface.
  • a SGSN may recognize communications from an M2M device as an M2M communication.
  • the SGSN may recognize that M2M communications may be routed to an M2M server.
  • the SGSN may identify a device or a communication from a device as M2M related based on subscriber information.
  • the SGSN may be M2M aware to the extent that it may associate M2M information with 3G WTRU/UE information.
  • the M2M device may refrain from sending an indication that is an M2M device in each message.
  • the SGSN may recognize that information from the M2M is M2M information based on the identity of the M2M device.
  • the device identity information may be subscriber information.
  • the SGSN may recognize that information from the M2M device is M2M information based on an indication in a received message.
  • the indication may be subscriber information.
  • an M2M device may be in communication with multiple SGSNs via multiple GM2M interfaces.
  • Subscriber information may be used by a SGSN to identify a M2M device.
  • an HLR may send default Access Point Name (APN) information along with other subscriber data to the SGSN.
  • the subscriber data including the APN may be used to identify a M2M device.
  • the SGSN may be configured with a M2M APN, and may compare the M2M APN with the received APN included in the subscriber data. If the SGSN M2M APN matches the received APN included in the subscriber data, the SGSN may recognize the device associated with the subscriber data as an M2M device.
  • the M2M APN may indicate that a device is an M2M device. Thus, a device may omit an indication of its M2M status, as the SGSN may recognize the device as M2M capable based on subscriber data associated with the device.
  • An M2M Server and a 3GPP network may use a combined authentication procedure.
  • a M2M capable WTRU may carry out generation of a cypher key (Ck) and an integrity key (Ik) during authentication with the network.
  • the M2M capable WTRU may also carry out generation of M2M Device Session Ciphering Key (KsCk) and M2M device
  • an M2M device may identify itself as M2M capable in a Mobility Management (MM) message, a Global Multimedia Mobility (GMM) message, a call control (CC) message, and/or a Session Management (SM) message.
  • MM Mobility Management
  • GMM Global Multimedia Mobility
  • CC call control
  • SM Session Management
  • an M2M device may set the 8 th bit of a MM message, a GMM message, a CC message, and/or a SM message to "1" to indicate that tit is M2M capable.
  • a device may indicate that it is M2M capable using the attach type field of in a GMM Attach request message.
  • the SGSN may receive an indication in the attach type field that the device is an M2M device and may store an indication of the M2M capability of the device in memory.
  • the skip indicator filed of Layer 3 (L3) messages may be set to "11 11" to indicate that a device is M2M capable.
  • FIG. 3 illustrates an example communication protocol stack for GM2M interface 326.
  • GM2M 326 may be a logical interface, for example if M2M Server 322 is integrated as part of SGSN 324.
  • GM2M 326 may be an internal interface inside of SGSN 324.
  • M2MAP 302 may be an M2M application part protocol layer for M2M Server 322.
  • M2MAP 304 may be an M2M application part protocol layer for SGSN 324.
  • UDP 306 and UDP 308 may form the user datagram protocol (UDP) layer for the GM2M interface.
  • the UDP destination port for M2MAP messages may be 2859.
  • UDP port 2859 may be the registered port for M2MAP.
  • M2M Server 322 may also include IP layer 310, L2 layer 314, and LI layer 318.
  • SGSN 324 may include IP layer 312, L2 layer 316, and LI layer 320.
  • SGSN 324 and M2M Server 322 may include publically addressable IP addresses.
  • M2MAP messages may have defined message formats with defined information elements.
  • Table 1 illustrates an exemplary M2MAP header.
  • the contents of Table 1 may be fixed parts of the M2MAP header.
  • the specific contents of each message e.g., information elements
  • the protocol discriminator may use a value of "11 10.”
  • FIG.4 illustrates an example attach procedure in accordance with an embodiment.
  • the attach procedure may be a combined GPRS/IMSI Attach procedure.
  • a Device Attach Update procedure may be defined in order to inform M2M Server 420 of MS/M2M 402 performing a successful or unsuccessful attach procedure.
  • MS/M2M 402 may send Attach Request 422 to New SGSN 406, for example via RAN 404.
  • Attach Request 422 may include a IMSI, a P-TMSI, an old Routing Area Identity (RAI), a classmark, a Cyphering Key Sequence Number (CKSN), an Attach Type, Discontinuous reception (DRX) parameters, an old P-TMSI and/or the like.
  • New SGSN 406 may send ID Request 424 to Old SGSN 408, for example to request a IMSI for MS/M2M 402 if it was omitted from the attach request, and in response may receive ID Response 426 which may identify MS/M2M 402, for example by IMSI.
  • ID Request 428 may be sent to MS/M2M 402, for example to request a IMSI for MS/M2M 402 if it was omitted from the attach request, and in response may receive ID
  • New SGSN 406 may facilitate Authentication 428 and Authentication 430 between MS/M2M 402 and HLR 416, respectively. If a PDP context had previously existed for MS/M2M 402, New SGSN 406 may send Delete PDP Context request 436 to GGSN 410. In response, GGSN 410 may send Delete PDP Context Response 438. New SGSN 406 may send Update Location 440 to HLR 416, for example, if a SGSN number has changed since a previous GPRS detach or if Attach Request 422 was the first attach request by MS/M2M 402.
  • Update Location 440 may include a SGSN number, a SGSN address, an IMSI for MS/M2M 402, and/or IMEI software version (IMEISV).
  • HLR 416 may send Cancel Location 442 to Old SGSN 408, for example to delete MM and PDP contexts.
  • Old SGSN 408 may respond with Cancel Location ACK 442 upon cancellation of procedures related to MS/M2M 402.
  • To delete an old PDP context for example if the contexts have yet to be deleted, Old SGSN 408 may send Delete PDP Context request 44 to GGSN 410.
  • GGSN may delete the old PDP context for MS/M2M 402 and respond with Delete PDP Context Response 436.
  • HLR 416 may send Insert Subscriber Data 448 to New SGSN 406, which may include subscriber data for MS/M2M 402.
  • the subscriber data may include an IMSI, GPRS subscription data and/or an APN for MS/M2M 402.
  • the APN may be a default APN for M2M devices.
  • New SGSN 406 may determine that MS/M2M 402 is an M2M capable device, for example based on the received APN. As an example, New SGSN 406 may compare the received APN with a default APN for M2M devices. New SGSN 406 may acknowledge the receipt of the subscriber data, for example by sending Insert Subscriber Data ACK 450.
  • HLR 416 may acknowledge the creation of a new MM context and/or successful location update by sending Location update ACK 452 to New SGSN 406.
  • Old SGSN 406 may inform New MSC/VLR 414 of the location update for MS/M2M 402 by sending Location update Request 454.
  • New MSC/VLR 414 may send update Location 456 to HLR 416.
  • HLR 416 may send Cancel Location 458 to Old MSC/VLR 418.
  • Old MSC/VLR 418 may respond with Cancel Location ACK 460.
  • HLR 416 may send Insert Subscriber Data 462 to New MSC/VLR 414, which may include subscriber data for MS/M2M 402.
  • the subscriber data may include an IMSI, GPRS subscription data and/or an APN for MS/M2M 402.
  • the APN may be a default APN for M2M devices.
  • New MSC/VLR 414 may acknowledge the receipt of the subscriber data, for example by sending Insert
  • HLR 416 may send update Location ACK 466 to New MSC/VLR 414.
  • New MSC/VLR 414 may indicate location acceptance by sending Location Update Accept 468 to New SGSN 406.
  • New SGSN 406 may then process the location update by performing
  • New SGSN 406 may send Attach Accept 472 to MS/M2M 402 indicating that the attach procedure was successful and is complete.
  • MS/M2M 402 may acknowledge Attach Accept 472 by sending Attach Complete 474.
  • New SGSN 406 may send TMSI Reallocation Complete 476, for example if VLR TMSI was changed.
  • SGSN 406 may send M2M Device Attach Update 478 to M2M server 420.
  • M2M Device Attach Update 478 M2M Device Attach
  • Update 478 may be sent from New SGSN 406 to M2M Server 420 via the GM2M interface.
  • Device Attach message may use a skip indicator field to indicate it is an M2M procedure.
  • SGSN may interpret the skip indicator field.
  • a WTRU may use an attach type field in GMM ATTACH REQUEST MESSAGE to indicate it is an M2M device.
  • M2M Server at the end of attach procedure.
  • M2M Device Attach Update messages There may be several types of M2M Device Attach Update messages that a SGSN may send to an M2M based on an attach procedure. For example, when an SGSN sends an Attach Accept Message to a M2M device, it may also send a M2M Device Attach Accept type M2M Device Attach Update message to the M2M Server via the GM2M interface. In another example, when an SGSN sends an Attach Reject Message to a M2M device, it may also send a M2M Device Attach Reject type M2M Device Attach Update message to the M2M Server via the GM2M interface.
  • the SGSN when the SGSN receives an Attach complete Message from an M2M device, it may send a M2M Device Attach Complete type M2M Device Attach Update message to the M2M server via the GM2M interface.
  • M2M Device Attach Update messages e.g., attach
  • a M2M server may send a M2M Device Attach Status Request message to a SGSN to determine an attach status of an M2M device.
  • the M2M Device Attach Status Request message may be sent via the GM2M server to the SGSN.
  • An example information element for a M2M Device Attach Status request messages is shown in Table 4, below.
  • FIG.5 illustrates an example routing area update procedure in accordance with an embodiment.
  • MS/M2M 502 may send Routing Area Update request 510 to SGSN 506.
  • Routing Area Update Request 510 may indicate that MS/M2M 502 may have entered a new routing area or may be a periodic routing area update.
  • Routing Area Update request 510 may include a P-TMSI, an old RAI, an old P-TMSI Signature, an Update Type and the like.
  • BSS Base Station Subsystem
  • Security Functions 512 may be executed between MS/M2M 502 and SGSN 506.
  • SGSN 506 may send Routing Area update 514 to MS/M2M 502. SGSN 506 may perform CAMEL Procedures 516 to process the Routing Area Update. MS/M2M 502 may send Routing Area Update Confirm 518 to SGSN 506 to confirm the routing area update is complete. In an example, SGSN 506 may associate information from M2/M2M 502 with M2M
  • the SGSN may have determined MS/M2M 502 was a M2M device in an earlier transaction (such as an attach).
  • SGSN 506 may send M2M Routing Area Update 520 to M2M Server 508, for example via the GM2M interface.
  • M2M Device Routing Area Update messages There may be several types of M2M Device Routing Area Update messages that a SGSN may send to an M2M server based on a Routing Area procedure. For example, when an SGSN sends a Routing Area Update Accept Message to a M2M device, it may also send a M2M Device Routing Area Update Accept type M2M Device Routing Area Update message to the M2M Server via the GM2M interface. In another example, when an SGSN sends a Routing Area Update Reject Message to a M2M device, it may also send a M2M Device Routing Area Update Reject type M2M Device Routing Area Update message to the M2M Server via the GM2M interface.
  • the SGSN when the SGSN receives a Routing Area Update Complete message from a M2M device, it may send a M2M Device Routing Area Update Complete type M2M Device Routing Area Update message to the M2M server via the GM2M interface.
  • M2M Device Routing Area Update messages e.g., Routing Area Update Accept/Reject/Complete type messages
  • Table 5 Example information elements for M2M Device Routing Area Update messages (e.g., Routing Area Update Accept/Reject/Complete type messages) are shown in Table 5, below.
  • Table 5 Information Element for M2M Device Routing Area Update Message
  • a M2M server may send a M2M Device Routing Area Information Request message to a SGSN to determine routing area information status of an M2M device.
  • the M2M Device Routing Area Information Request message may be sent via the GM2M interface.
  • An example information element for a M2M Device Routing Area Information Request message is shown in Table 6, below.
  • FIG.6 illustrates an example PDP Context Update procedure in accordance with an embodiment.
  • MS/M2M 602 may send Activate PDP Context Request 612 to SGSN 606.
  • Activate PDP Context Request 612 may include a Network Service Access Point Identifier (NSAPI), a Transaction Identifier (TI), a PDP type, a PDP Address, an APN, a Quality of Service (QoS) Request, Protocol Configuration options of the like.
  • SGSN 606 may determine that MS/M2M 602 is M2M capable, for example based on a received APN, IMSI or other identifier.
  • SGSN 606 may perform CAMEL Procedures 614 to process Activate PDP Context Request 612 and PDP Context establishment. SGSN 606 may validate thee PDP Context request. If SGSN 606 is unable to validate the request, it may send MS/M2M 602 an Activate PDP Context Reject Message (Not shown in FIG. 6). However, to create the PDP Context, SGSN 606 may send Create PDP Context Request 616 to GGSN 608. GGSN 608 may choose to accept or reject the request. If accepted, GGSN 608 may send Create PDP Context Response 618 to SGSN 606.
  • MS/M2M 602, RAN 604 and SGSN 606 may engage in Radio Access Bearer Setup 620. If BSS trace is activated, SGSN may send Invoke trace 622 to RAN 604. SGSN 606 may also send Update PDP Context request 624 to GGSN 608, for example if during Radio Access Bearer Setup 620 there was a QOS change for MS/M2M 602. If so, GGSN may respond with Update PDP Context Response 626. SGSN 606 may perform further CAMEL Procedures 628 to acknowledge PDP Context establishment. SGSN may send Activate PDP Context Accept 630 to MS/M2M 602, which may indicate that a PDP context was successfully established.
  • SGSN 606 may send PDP Context Update 632 to M2M Server 610 to inform M2M Server 610 of the new PDP Context for MS/M2M 602.
  • PDP Context Update 632 may be sent via the GM2M interface.
  • M2M Device PDP Context Activation Update messages may be sent to an M2M Server based on a Routing Area procedure. For example, when a SGSN sends an Activate PDP Context Accept message to a M2M device, it may also send a M2M Device Activate PDP Context Accept type M2M Device PDP Context
  • an SGSN sends an Activate PDP Context Reject Message to a M2M device, it may also send a M2M Device Activate PDP Context Reject type M2M Device PDP Context Activation
  • SGSN receives a Modify PDP Context Accept message from a M2M device, it may send a M2M
  • a SGSN may send a Modify PDP Context Accept message to a M2M device, in which case it may still send a M2M Device Modify PDP Context Accept type M2M Device PDP Context Activation Update message to the M2M server via the GM2M interface.
  • a SGSN may also send or receive a Modify PDP Context Reject message, and in either case the SGSN may send a M2M Device Modify PDP Context Reject type M2M Device PDP Context Activation Update message to the M2M server via the GM2M interface.
  • Example information elements for M2M Device PDP Context Activation Update messages are shown in Table 7, below.
  • FIG.7 illustrates an example device detach procedure in accordance with an embodiment.
  • MS/M2M 702 may send Detach Request 714 to SGSN 706.
  • Detach Request 714 may indicate that MS/M2M 502 desires to detach from the network and may include a detach type, a P-TMSI, a P-TSMI signature, a switch off notification and/or the like.
  • SGSN 706 may send GGSN 708 Delete PDP Context Request 714.
  • GGSN 708 may delete the PDP Context for MS/M2M 702 and send SGSN 706 Delete PDP Context response 716.
  • SGSN 706 may perform CAMEL Procedures 718 to process the PDP Context deletion.
  • SGSN 706 may send IMSI Detach Indication 720 to MSC/VLR 710, for example if Detach Request 714 indicates that the detach procedure is an IMSI detach procedure.
  • SGSN 706 may send GPRS Detach Indication 722 to MSC/VLR 710, for example if Detach Request 714 indicates that the detach procedure is a GPRS detach procedure.
  • SGSN 706 may perform CAMEL Procedures 724 to process detach.
  • SGSN 706 may send Detach Accept 726 to MS/M2M 702 to indicate the detach procedure was successful.
  • SGSN 706 may send M2M Device Detach Update 728 to M2M Server 712, for example via the GM2M interface, in order to inform M2M Server 712 of the detach procedure.
  • MS/M2M 702, BSS/UTRAN 704, and/or SGSN 706 may also perform PS Signaling Connection Release 730.
  • Example information elements for M2M Device Detach Accept Messages are shown in Table 8, below. ⁇ Information Element Type/Reference Presence Format Length
  • Table 8 Information Element for M2M Device Detach Update Message
  • FIG. 8 illustrates an example authentication and key agreement procedure in accordance with an embodiment.
  • the authentication and key agreement procedure may begin with distribution of authentication vectors from Home Environment (HE) to the Serving Network (SN) at 810.
  • VLR/SGSN 804 may send Authentication Data Request 812 to HE/HLR 806.
  • HE/HLR 806 may generate authentication vectors and transmit the
  • Each authentication vector may include a random number (RAND), an expected response (XRES), a cipher key (CK), an integrity key (IK), and an authentication token (AUTH).
  • RAND random number
  • XRES expected response
  • CK cipher key
  • IK integrity key
  • AUTH authentication token
  • VLR SGSN 804 may store the authentication vectors.
  • VLR/SGSN 804 may engage in authentication and key establishment.
  • AV authentication vector
  • VLR/SGSN 804 may transmit user authentication request 824 to MS/M2M 802.
  • User authentication request 824 may include RAND(i) and AUTH(i), which may be the random number and the authentication token for AV(i), respectively.
  • MS/M2M 802 may verify AUTN(i), for example by checking a Universal Subscriber Identity Module (USIM), and may compute a response based on AV9I) (RES(i)).
  • MS/M2M 802 may send RES(i) to VLR/SGSN 804 as part of User authentications response 828.
  • VLR/SGSN 804 may compare RES(i) and XRES(i).
  • VLR/SGSN 804 may consider the authentication and key agreement exchange to be successfully completed.
  • VLR/SGSN 804 may select CK(i) and IK(i) as the cyphering and integrity keys.
  • MS/M2M 802 may compute CK(i) and IK(i).
  • VLR/SGSN 804 may send M2M Device Authentication and Key Update 836 to M2M Server 808, for example via the GM2M interface, to inform M2M Server of the successful authentication and key agreement.
  • M2M Device Authentication and Key Agreement Update messages There may be several types of M2M Device Authentication and Key Agreement Update messages that a SGSN may send to an M2M server based on an authentication, key agreement and/or cyphering procedure. For example, when a SGSN receives an Authentication and Key Agreement Response Message from a M2M device, it may also send a M2M Device Authentication and Key Agreement Response type M2M Device Authentication and Key Agreement Update message to the M2M Server via the GM2M interface.
  • an SGSN when an SGSN receives an Authentication and Key Agreement Reject Message from a M2M device, it may also send a M2M Device Authentication and Key Agreement Reject Message type M2M Device Authentication and Key Agreement Update message to the M2M Server via the GM2M interface.
  • the SGSN when the SGSN receives an Authentication and Key Agreement Failure Message from a M2M device, it may send a M2M Device Ro Authentication and Key Agreement Failure type M2M Device Authentication and Key Agreement Update message to the M2M server via the GM2M interface.
  • Example information elements for M2M Device Authentication and Key Agreement Update messages (e.g., Authentication and Key Agreement Failure/Accept/Reject type messages) are shown in Table 9, below.
  • a reject message may include a reject reason and/or the ciphering and/or integrity keys.
  • a M2M server may send a M2M Device Authentication and Key Agreement Request message to a SGSN to determine authentication and key agreement status of an M2M device.
  • the M2M Device Authentication and Key Agreement Request message may be sent via the GM2M interface.
  • Table 10 Information Element for M2M Device Authentication and Key Agreement
  • FIG. 9 illustrates an example security mode update procedure in accordance with an embodiment.
  • Radio Resource Control (RRC) Connection Establishment may be performed between MS/M2M 902 and Serving Radio Network Controller (SRNC) 904.
  • SRNC 904 may store Hyper Frame Number (HFN) START values and UE Security Capability.
  • MSM/M2M 902 may send Initial L3 Message 914 to VLR/SGSN 906.
  • Initial L3 Message 914 may be a location update request, a Connection Management (CM) service request a routing area update request, an attach request, a paging response, or the like.
  • MS/M2M 902 may perform authentication and key generation, for example, as described with respect to FIG. 8.
  • VLR/SGSN 906 may decide allowed UE cyphering capabilities (UIAs) and integrity capabilities (UEAs). VLR/SGSN 906 may send Security Mode Command 920 to SRNC 904, which may include UIAs, IK, UEAs, CK, and/or the like. At 922, SRNC 904 may generate a random value (FRESH) and may initiate downlink integrity protection.
  • UAAs UE cyphering capabilities
  • UEAs integrity capabilities
  • SRNC 904 may generate a random value (FRESH) and may initiate downlink integrity protection.
  • SRNC 904 may send Security Mode Command 924 to MS/M2M 902.
  • Security Mode Command 924 may include a CN domain, a UIA, FRESH, a UE security capability, UEA, Message Authentication Code for Integrity (MAC-I), and/or the like.
  • MS/M2M may verify the message and start integrity security.
  • MS/M2M 902 may indicate that the security mode procedure was successful by sending Security Mode Complete 930.
  • SRNC 904 may verify Security Mode Complete 930 has been received.
  • SRNC 904 may send Security Mode Complete to VLR/SRNC 906.
  • MS/M2M 902 may start cyphering/deciphering.
  • SRNC 904 may start cyphering/deciphering.
  • VLR/SRNC 906 may send M2M Device Security Mode Update 940 to M2M Server 908, for example via the GM2M interface.
  • M2M Device Security Mode Update messages There may be several types of M2M Device Security Mode Update messages that a SGSN may send to an M2M server based on a security mode procedure. For example, when a SGSN receives a Security Mode Complete Message from a RNC, it may also send a M2M Device Security Mode Complete type M2M Device Security Mode Update message to the M2M Server via the GM2M interface. In another example, when an SGSN receives a Security Mode Reject Message from a RNC, it may also send a M2M Device Security Mode Reject Message type M2M Device Security Mode Update message to the M2M Server via the GM2M interface.
  • Example information elements for M2M Device Authentication and Key Agreement Update messages (e.g., Authentication and Key Agreement Failure/Accept/Reject type messages) are shown in Table 9, below.
  • SGSN may store an indication that the M2M device is M2M capable from an earlier communication session.
  • a M2M server may send a M2M Security Request message to a SGSN to determine security mode status of an M2M device.
  • the M2M Device Security Mode Request message may be sent via the GM2M interface.
  • An example information element for a M2M Device Security Mode Request message is shown in Table 12, below. ⁇ Information Element Type/Reference Presence Format Length
  • Table 12 Information Element for M2M Device Security Mode Request Messages
  • FIG. 10 illustrates an example location reporting control procedure in accordance with an embodiment.
  • SGSN 1006 may send Location Reporting Control 1010 to RAN 1004.
  • SGSN 1006 may send Location reporting Control 1010 because it detects form subscriber data for MS/M2M 1002 that SGSN 1006 should monitor the service area in which MS/M2M 1002 is located.
  • Location reporting Control 1010 may trigger a periodic or standalone report about the current location of MS/M2M 1002.
  • RAN 1004 may store the report, for example if periodic reporting is requested.
  • SGSN 1006 may request to be notified if MS/M2M 1002 moves into or out of a determined service region.
  • MS/M2M 1002 may move to a new service location, which may be in a reporting area request in Location Reporting Control 1010.
  • RAN 1004 may determine the location of MS/M2M 1002 and send Location report 1014 to SGSN 1006.
  • SGSN 1006 may inform M2M server 1008 of the location of MS/M2M 1002.
  • M2M Device Location Report Update 1016 may be sent to M2M Server 1008, for example via the GM2M interface.
  • SGSN 1006 may cancel an early location report request, for example by sending Cancel Location reporting 1018 to RAN 1004.
  • Example information elements for M2M Device Location Report Update messages are shown in Table 9, below.
  • SGSN may store an indication that the M2M device is M2M capable from an earlier communication session.
  • a M2M server may send a M2M Security Request message to a SGSN to request a location report status of an M2M device.
  • the M2M Device Location Reporting Request message may be sent via the GM2M interface.
  • An example information element for a M2M Device Location Reporting Request message is shown in Table 12, below.
  • FIG. 1 1 illustrates an example network initiated PDP Context Activation procedure in accordance with an embodiment.
  • the control procedure may be initiated by M2M Server 11 10 or may be initiated by a cellular network node.
  • M2M Server 11 10 is initiating a network control procedure (for example a PDP context activation procedure as shown in FIG. 1 1)
  • M2M Server 110 may send Request 1 109 to SGSN 1 104, for example via the GM2M interface.
  • Request 1109 may be a M2M Device PDP Context Activation/Modification Request Message.
  • SGSN 1104 may send Request Initiation 11 1 1 to GGSN 1 108 which may initiate a network control procedure such as a PDP context activation procedure.
  • a network control procedure such as a PDP context activation procedure.
  • the PDP context activation procedure may be initiated by a cellular network node.
  • GGSN 1108 may receive PDP Protocol Data Unit (PDU) 11 12 from the cellular network node.
  • PDP PDU 1 112 may be sent from M2M Server 11 10 directly to GGSN 1108.
  • GGSN 1 108 may determine if a Network-requested PDP Context Activation procedure should be activated. GGSN 1 108 may send Send Routeing Information for GPRS 114 to HLR 1106. If HLR 1106 determined the request may be served, HLR 1 10 may send Send Routeing Information for GPRS ACK 11 16 to GGSN 1108. GGSN 1 108 may send PDU Notification Request 1 1 18 to SGSN 1104, whose identity may be indicated by HLR 1106. SGSN 1 104 may send PDU Notification Response 1120, which may indicate that it will inform MS/M2M 1102 to activate the PDP context indicated. SGSN 1 104 may send Request PDP Context Activation 1124 to MS/M2M 1 102.
  • MS/M2M 1102 may perform PDP Context Activation Procedure 1126 with GGSN 1 108.
  • SGSN 1 104 may send PDP Context Update 1 128 to M2M Server 1 110, for example via the GM2M interface.
  • a SGSN may send a M2M Device PDP Context Deactivation update to a M2M server, for example upon the completion of a successful PDP context deactivation procedure.
  • M2M Device PDP Context Deactivation messages There may be several types of M2M Device PDP Context Deactivation messages that a SGSN may send to an M2M server based on a PDP deactivation procedure. For example, when a SGSN receives a Deactivate PDP Context Request Message from a M2M device, it may also send a M2M Device Deactivate PDP Context Request type M2M Device PDP Context Deactivation Update message to the M2M Server via the GM2M interface.
  • an SGSN when an SGSN sends a Deactivate PDP Context Accept Message to a M2M device, it may also send a M2M Device Deactivate PDP Context Accept Message type M2M Device PDP Context Deactivation Update message to the M2M Server via the GM2M interface.
  • Example information elements for M2M Device DP Context Deactivation Update messages (e.g., Deactivate PDP Context Accept/Complete type messages) are shown in Table 16, below.
  • a network node such as a M2M server, may initiate a PDP Context Deactivation Request.
  • a M2M server may send a M2M Device PDP Context Deactivation Request to a SGSN.
  • the SGSN may start a PDP context deactivation procedure.
  • Example information elements for M2M Device PDP Context Deactivation Update messages (e.g., Deactivate PDP Context Accept/Complete type messages) are shown in Table 17, below.
  • a M2M server may initiate a PDP Context Information Request.
  • a M2M server may send a M2M Device PDP Context Information Request to a SGSN to request PDP context status of a M2M device.
  • the SGSN may treat the request a M2M PDP Context Activation Update message.
  • Example information elements for M2M Device PDP Context Information Request messages are shown in Table 18, below. ⁇ Information Element Type/Reference Presence Format Length
  • a timeout may be employed for each of the aforementioned "request" messages originating from a M2M server and sent to a SGSN via the GM2M interface.
  • the timeout may be multiple of 1 second, and in an embodiment may not exceed 60 seconds.
  • the procedure may be cancelled and/or reinitiated.
  • Examples of computer-readable storage media include, but are not limited to, a read only memory (ROM), a random access memory (RAM), a register, cache memory, semiconductor memory devices, magnetic media such as internal hard disks and removable disks, magneto-optical media, and optical media such as CD-ROM disks, and digital versatile disks (DVDs).
  • ROM read only memory
  • RAM random access memory
  • register cache memory
  • semiconductor memory devices magnetic media such as internal hard disks and removable disks, magneto-optical media, and optical media such as CD-ROM disks, and digital versatile disks (DVDs).
  • a processor in association with software may be used to implement a radio frequency transceiver for use in a WTRU, UE, terminal, base station, RNC, or any host computer.

Abstract

An M2M Server may be integrated into a 3 GPP network. A network node, for example a Serving General Packet Radio Service (GPRS) Support Node (SGSN) may include a dedicated interface with a M2M server. The interface may be called a GM2M interface. The interface may be a logical interface internal to the network node. The node may receive subscriber data and control data, wherein the control data facilitates a network control procedure and the subscriber data identifies a device involved in the network control procedure. The node may determine that the device involved in the network control procedure is a machine to machine device based on the subscriber data. The node may also send the control data to a machine to machine server using a message sent via a dedicated interface with the machine to machine server.

Description

INTERFACE OF AN M2M SERVER WITH THE 3GPP CORE NETWORK
CROSS REFERENCE TO RELATED APPLICATIONS
[0001] This application claims the benefit of U.S. Provisional Patent Application No. 61/358,688 filed June 25, 2010, the contents of which are hereby incorporated by reference herein.
BACKGROUND
[0002] Machine type communication (MTC), or alternately machine to machine (M2M) communication, is a form of data communication which may involve one or more devices or entities that may communicate without human interaction. Respective communication networks may include any number of MTC capable devices. Metering devices or tracking devices may be examples of MTC devices. As used herein, the term user equipment (UE), Mobile Station (MS), and Wireless Transmit/Receive Unit (WTRU) may include MTC devices.
[0003] Machine type communications may use an MTC Server, which may alternately be referred to as an M2M Server. A M2M server may collect data or control information from MTC devices. A M2M server may also send data and other information to M2M devices. MTC devices may communicate via 3 GPP networks such as Long Term Evolution (LTE) networks, Universal Mobile Telecommunication System (UMTS) networks, Worldwide Interoperability for microwave Access (WiMAX) networks, and the like. SUMMARY
[0004] A cellular network node, for example a Serving General Packet Radio Service (GPRS) Support Node (SGSN), may communicate with an M2M server. The cellular network node may receive subscriber data and control data. The control data may facilitate a network control procedure and the subscriber data may identify a device involved in the network control procedure. Example network control procedures may include network attach procedures, network detach procedures, authentication procedures, security mode procedures, Packet Data Protocol (PDP) context procedures, location area update procedures, routing area update procedures, tracking area update procedures, or the like.
[0005] The cellular network node may determine that the device involved in the network control procedure is a machine to machine device based on the subscriber data. For example, the subscriber data may include an Access Point Name (APN), and the cellular network node may determine that a device is an M2M device based on the APN. The cellular network node may also send the control data to a machine to machine server using a message sent via a dedicated interface with the machine to machine server. The dedicated interface may be called a GM2M interface. The dedicated interface may be a logical interface internal to the network node.
[0006] The M2M server may request control data such as the current status of a M2M device. For example, the M2M server may request control data such as an attach status, a routing area status, security mode status, authentication status, PDP context status, and/or the like. The control data may be based on mobility control information or connection control information. The request for control data may be sent to a cellular network node via the GM2M interface. The cellular network node may initiate a network control procedure based on the request from the M2M server. The cellular network node may send control information from the network control procedure to the M2M device via the GM2M interface.
BRIEF DESCRIPTION OF THE DRAWINGS
[0007] A more detailed understanding may be had from the following description, given by way of example in conjunction with the accompanying drawings wherein:
[0008] FIG. 1 A is a system diagram of an example communications system in which one or more disclosed embodiments may be implemented;
[0009] FIG. IB is a system diagram of an example wireless transmit/receive unit (WTRU) that may be used within the communications system illustrated in FIG. 1A; [0010] FIG. 1C is a system diagram of an example radio access network and an example core network that may be used within the communications system illustrated in FIG. 1A;
[0011] FIG. ID is a system diagram of an another example radio access network and an another example core network that may be used within the communications system illustrated in FIG. 1A;
[0012] FIG. IE is a system diagram of an another example radio access network and an another example core network that may be used within the communications system illustrated in FIG. 1A;
[0013] FIG. 2 illustrates an example embodiment of a 3GPP network including a integrated M2M server;
[0014] FIG. 3 illustrates an example communication protocol stack for communication of a GM2M interface;
[0015] FIG. 4 illustrates an example M2M device attach procedure in accordance with an embodiment;
[0016] FIG. 5 illustrates an example M2M device routing area update procedure in accordance with an embodiment;
[0017] FIG. 6 illustrates an example M2M device initiated Packet Data Protocol (PDP) context activation procedure in accordance with an embodiment;
[0018] FIG. 7 illustrates an example M2M device detach procedure in accordance with an embodiment;
[0019] FIG. 8 illustrates an example authentication and cyphering procedure in accordance with an embodiment;
[0020] FIG. 9 illustrates an example security mode procedure in accordance with an embodiment;
[0021] FIG. 10 illustrates an example location reporting control procedure in accordance with an embodiment; and
[0022] FIG. 1 1 illustrates an example network initiated PDP context activation procedure in accordance with an embodiment.
DETAILED DESCRIPTION
[0023] A detailed description of illustrative embodiments will now be described with reference to the various Figures. Although this description provides a detailed example of possible implementations, it should be noted that the details are intended to be exemplary and in no way limit the scope of the application.
[0024] FIG. 1 A is a diagram of an example communications system 100 in which one or more disclosed embodiments may be implemented. The communications system 100 may be a multiple access system that provides content, such as voice, data, video, messaging, broadcast, etc., to multiple wireless users. The communications system 100 may enable multiple wireless users to access such content through the sharing of system resources, including wireless bandwidth. For example, the communications systems 100 may employ one or more channel access methods, such as code division multiple access (CDMA), time division multiple access (TDMA), frequency division multiple access (FDMA), orthogonal FDMA (OFDMA), single- carrier FDMA (SC-FDMA), and the like.
[0025] As shown in FIG. 1A, the communications system 100 may include wireless transmit/receive units (WTRUs) 102a, 102b, 102c, and/or 102d (which generally or collectively may be referred to as WTRU 102), a radio access network (RAN) 103/104/105, a core network 106/107/109, a public switched telephone network (PSTN) 108, the Internet 1 10, and other networks 1 12, though it will be appreciated that the disclosed embodiments contemplate any number of WTRUs, base stations, networks, and/or network elements. Each of the WTRUs 102a, 102b, 102c, 102d may be any type of device configured to operate and/or communicate in a wireless environment. By way of example, the WTRUs 102a, 102b, 102c, 102d may be configured to transmit and/or receive wireless signals and may include user equipment (UE), a mobile station, a fixed or mobile subscriber unit, a pager, a cellular telephone, a personal digital assistant (PDA), a smartphone, a laptop, a netbook, a personal computer, a wireless sensor, consumer electronics, and the like.
[0026] The communications systems 100 may also include a base station 114a and a base station 114b. Each of the base stations 1 14a, 114b may be any type of device configured to wirelessly interface with at least one of the WTRUs 102a, 102b, 102c, 102d to facilitate access to one or more communication networks, such as the core network 106/107/109, the Internet 1 10, and/or the networks 112. By way of example, the base stations 114a, 114b may be a base transceiver station (BTS), a Node-B, an eNode B, a Home Node B, a Home eNode B, a site controller, an access point (AP), a wireless router, and the like. While the base stations 1 14a, 1 14b are each depicted as a single element, it will be appreciated that the base stations 1 14a, 1 14b may include any number of interconnected base stations and/or network elements.
[0027] The base station 114a may be part of the RAN 103/104/105, which may also include other base stations and/or network elements (not shown), such as a base station controller
(BSC), a radio network controller (RNC), relay nodes, etc. The base station 114a and/or the base station 1 14b may be configured to transmit and/or receive wireless signals within a particular geographic region, which may be referred to as a cell (not shown). The cell may further be divided into cell sectors. For example, the cell associated with the base station 114a may be divided into three sectors. Thus, in one embodiment, the base station 114a may include three transceivers, i.e., one for each sector of the cell. In another embodiment, the base station 1 14a may employ multiple-input multiple output (MIMO) technology and, therefore, may utilize multiple transceivers for each sector of the cell.
[0028] The base stations 114a, 1 14b may communicate with one or more of the WTRUs 102a, 102b, 102c, 102d over an air interface 115/116/1 17, which may be any suitable wireless communication link (e.g., radio frequency (RF), microwave, infrared (IR), ultraviolet (UV), visible light, etc.). The air interface 115/116/1 17 may be established using any suitable radio access technology (RAT).
[0029] More specifically, as noted above, the communications system 100 may be a multiple access system and may employ one or more channel access schemes, such as CDMA, TDMA, FDMA, OFDMA, SC-FDMA, and the like. For example, the base station 114a in the RAN 103/104/105 and the WTRUs 102a, 102b, 102c may implement a radio technology such as Universal Mobile Telecommunications System (UMTS) Terrestrial Radio Access (UTRA), which may establish the air interface 1 15/116/1 17 using wideband CDMA (WCDMA).
WCDMA may include communication protocols such as High-Speed Packet Access (HSPA) and/or Evolved HSPA (HSPA+). HSPA may include High-Speed Downlink Packet Access (HSDPA) and/or High-Speed Uplink Packet Access (HSUPA).
[0030] In another embodiment, the base station 1 14a and the WTRUs 102a, 102b, 102c may implement a radio technology such as Evolved UMTS Terrestrial Radio Access (E-UTRA), which may establish the air interface 115/116/1 17 using Long Term Evolution (LTE) and/or LTE-Advanced (LTE- A).
[0031] In other embodiments, the base station 114a and the WTRUs 102a, 102b, 102c may implement radio technologies such as IEEE 802.16 (i.e., Worldwide Interoperability for Microwave Access (WiMAX)), CDMA2000, CDMA2000 IX, CDMA2000 EV-DO, Interim Standard 2000 (IS-2000), Interim Standard 95 (IS-95), Interim Standard 856 (IS-856), Global System for Mobile communications (GSM), Enhanced Data rates for GSM Evolution (EDGE), GSM EDGE (GERAN), and the like.
[0032] The base station 114b in FIG. 1A may be a wireless router, Home Node B,
Home eNode B, or access point, for example, and may utilize any suitable RAT for facilitating wireless connectivity in a localized area, such as a place of business, a home, a vehicle, a campus, and the like. In one embodiment, the base station 1 14b and the WTRUs 102c, 102d may implement a radio technology such as IEEE 802.11 to establish a wireless local area network (WLAN). In another embodiment, the base station 1 14b and the WTRUs 102c, 102d may implement a radio technology such as IEEE 802.15 to establish a wireless personal area network (WPAN). In yet another embodiment, the base station 1 14b and the WTRUs 102c, 102d may utilize a cellular-based RAT (e.g., WCDMA, CDMA2000, GSM, LTE, LTE-A, etc.) to establish a picocell or femtocell. As shown in FIG. 1A, the base station 114b may have a direct connection to the Internet 110. Thus, the base station 1 14b may not be required to access the Internet 1 10 via the core network 106/107/109.
[0033] The RAN 103/104/105 may be in communication with the core network 106/107/109, which may be any type of network configured to provide voice, data, applications, and/or voice over internet protocol (VoIP) services to one or more of the WTRUs 102a, 102b, 102c, 102d. For example, the core network 106/107/109 may provide call control, billing services, mobile location-based services, pre-paid calling, Internet connectivity, video distribution, etc., and/or perform high-level security functions, such as user authentication. Although not shown in FIG. 1A, it will be appreciated that the RAN 103/104/105 and/or the core network 106/107/109 may be in direct or indirect communication with other RANs that employ the same RAT as the RAN 103/104/105 or a different RAT. For example, in addition to being connected to the RAN 103/104/105, which may be utilizing an E-UTRA radio technology, the core network 106/107/109 may also be in communication with another RAN (not shown) employing a GSM radio technology.
[0034] The core network 106/107/109 may also serve as a gateway for the WTRUs 102a, 102b, 102c, 102d to access the PSTN 108, the Internet 1 10, and/or other networks 1 12. The PSTN 108 may include circuit-switched telephone networks that provide plain old telephone service (POTS). The Internet 1 10 may include a global system of interconnected computer networks and devices that use common communication protocols, such as the transmission control protocol (TCP), user datagram protocol (UDP) and the internet protocol (IP) in the TCP/IP internet protocol suite. The networks 1 12 may include wired or wireless
communications networks owned and/or operated by other service providers. For example, the networks 1 12 may include another core network connected to one or more RANs, which may employ the same RAT as the RAN 103/104/105 or a different RAT.
[0035] Some or all of the WTRUs 102a, 102b, 102c, 102d in the communications system 100 may include multi-mode capabilities, i.e., the WTRUs 102a, 102b, 102c, 102d may include multiple transceivers for communicating with different wireless networks over different wireless links. For example, the WTRU 102c shown in FIG. 1A may be configured to communicate with the base station 114a, which may employ a cellular-based radio technology, and with the base station 1 14b, which may employ an IEEE 802 radio technology.
[0036] FIG. IB is a system diagram of an example WTRU 102. As shown in FIG. IB, the WTRU 102 may include a processor 118, a transceiver 120, a transmit/receive element 122, a speaker/microphone 124, a keypad 126, a display/touchpad 128, non-removable memory 130, removable memory 132, a power source 134, a global positioning system (GPS) chipset 136, and other peripherals 138. It will be appreciated that the WTRU 102 may include any subcombination of the foregoing elements while remaining consistent with an embodiment. Also, embodiments contemplate that the base stations 114a and 114b, and/or the nodes that base stations 114a and 114b may represent, such as but not limited to transceiver station (BTS), a Node-B, a site controller, an access point (AP), a home node-B, an evolved home node-B (eNodeB), a home evolved node-B (HeNB), a home evolved node-B gateway, and proxy nodes, among others, may include some or all of the elements depicted in FIG. IB and described herein.
[0037] The processor 118 may be a general purpose processor, a special purpose processor, a conventional processor, a digital signal processor (DSP), a plurality of
microprocessors, one or more microprocessors in association with a DSP core, a controller, a microcontroller, Application Specific Integrated Circuits (ASICs), Field Programmable Gate Array (FPGAs) circuits, any other type of integrated circuit (IC), a state machine, and the like. The processor 1 18 may perform signal coding, data processing, power control, input/output processing, and/or any other functionality that enables the WTRU 102 to operate in a wireless environment. The processor 1 18 may be coupled to the transceiver 120, which may be coupled to the transmit/receive element 122. While FIG. IB depicts the processor 1 18 and the transceiver 120 as separate components, it will be appreciated that the processor 118 and the transceiver 120 may be integrated together in an electronic package or chip.
[0038] The transmit/receive element 122 may be configured to transmit signals to, or receive signals from, a base station (e.g., the base station 1 14a) over the air interface
1 15/116/1 17. For example, in one embodiment, the transmit/receive element 122 may be an antenna configured to transmit and/or receive RF signals. In another embodiment, the transmit/receive element 122 may be an emitter/detector configured to transmit and/or receive IR, UV, or visible light signals, for example. In yet another embodiment, the transmit/receive element 122 may be configured to transmit and receive both RF and light signals. It will be appreciated that the transmit/receive element 122 may be configured to transmit and/or receive any combination of wireless signals. [0039] In addition, although the transmit/receive element 122 is depicted in FIG. IB as a single element, the WTRU 102 may include any number of transmit/receive elements 122. More specifically, the WTRU 102 may employ MIMO technology. Thus, in one embodiment, the WTRU 102 may include two or more transmit/receive elements 122 (e.g., multiple antennas) for transmitting and receiving wireless signals over the air interface 115/116/1 17.
[0040] The transceiver 120 may be configured to modulate the signals that are to be transmitted by the transmit/receive element 122 and to demodulate the signals that are received by the transmit/receive element 122. As noted above, the WTRU 102 may have multi-mode capabilities. Thus, the transceiver 120 may include multiple transceivers for enabling the WTRU 102 to communicate via multiple RATs, such as UTRA and IEEE 802.11, for example.
[0041] The processor 118 of the WTRU 102 may be coupled to, and may receive user input data from, the speaker/microphone 124, the keypad 126, and/or the display/touchpad 128 (e.g., a liquid crystal display (LCD) display unit or organic light-emitting diode (OLED) display unit). The processor 118 may also output user data to the speaker/microphone 124, the keypad 126, and/or the display/touchpad 128. In addition, the processor 1 18 may access information from, and store data in, any type of suitable memory, such as the non-removable memory 130 and/or the removable memory 132. The non-removable memory 130 may include random- access memory (RAM), read-only memory (ROM), a hard disk, or any other type of memory storage device. The removable memory 132 may include a subscriber identity module (SIM) card, a memory stick, a secure digital (SD) memory card, and the like. In other embodiments, the processor 118 may access information from, and store data in, memory that is not physically located on the WTRU 102, such as on a server or a home computer (not shown).
[0042] The processor 118 may receive power from the power source 134, and may be configured to distribute and/or control the power to the other components in the WTRU 102. The power source 134 may be any suitable device for powering the WTRU 102. For example, the power source 134 may include one or more dry cell batteries (e.g., nickel-cadmium ( iCd), nickel-zinc (NiZn), nickel metal hydride (NiMH), lithium-ion (Li-ion), etc.), solar cells, fuel cells, and the like.
[0043] The processor 118 may also be coupled to the GPS chipset 136, which may be configured to provide location information (e.g., longitude and latitude) regarding the current location of the WTRU 102. In addition to, or in lieu of, the information from the GPS chipset
136, the WTRU 102 may receive location information over the air interface 1 15/1 16/1 17 from a base station (e.g., base stations 1 14a, 114b) and/or determine its location based on the timing of the signals being received from two or more nearby base stations. It will be appreciated that the WTRU 102 may acquire location information by way of any suitable location-determination method while remaining consistent with an embodiment.
[0044] The processor 118 may further be coupled to other peripherals 138, which may include one or more software and/or hardware modules that provide additional features, functionality and/or wired or wireless connectivity. For example, the peripherals 138 may include an accelerometer, an e-compass, a satellite transceiver, a digital camera (for photographs or video), a universal serial bus (USB) port, a vibration device, a television transceiver, a hands free headset, a Bluetooth® module, a frequency modulated (FM) radio unit, a digital music player, a media player, a video game player module, an Internet browser, and the like.
[0045] FIG. 1C is a system diagram of the RAN 103 and the core network 106 according to an embodiment. As noted above, the RAN 103 may employ a UTRA radio technology to communicate with the WTRUs 102a, 102b, 102c over the air interface 1 15. The RAN 103 may also be in communication with the core network 106. As shown in FIG. 1C, the RAN 103 may include Node-Bs 140a, 140b, 140c, which may each include one or more transceivers for communicating with the WTRUs 102a, 102b, 102c over the air interface 115. The Node-Bs 140a, 140b, 140c may each be associated with a particular cell (not shown) within the RAN 103. The RAN 103 may also include RNCs 142a, 142b. It will be appreciated that the RAN 103 may include any number of Node-Bs and RNCs while remaining consistent with an embodiment.
[0046] As shown in FIG. 1C, the Node-Bs 140a, 140b may be in communication with the RNC 142a. Additionally, the Node-B 140c may be in communication with the RNC142b. The Node-Bs 140a, 140b, 140c may communicate with the respective RNCs 142a, 142b via an Iub interface. The RNCs 142a, 142b may be in communication with one another via an Iur interface. Each of the RNCs 142a, 142b may be configured to control the respective Node-Bs 140a, 140b, 140c to which it is connected. In addition, each of the RNCs 142a, 142b may be configured to carry out or support other functionality, such as outer loop power control, load control, admission control, packet scheduling, handover control, macrodiversity, security functions, data encryption, and the like.
[0047] The core network 106 shown in FIG. 1C may include a media gateway (MGW) 144, a mobile switching center (MSC) 146, a serving GPRS support node (SGSN) 148, and/or a gateway GPRS support node (GGSN) 150. While each of the foregoing elements are depicted as part of the core network 106, it will be appreciated that any one of these elements may be owned and/or operated by an entity other than the core network operator. [0048] The RNC 142a in the RAN 103 may be connected to the MSC 146 in the core network 106 via an IuCS interface. The MSC 146 may be connected to the MGW 144. The MSC 146 and the MGW 144 may provide the WTRUs 102a, 102b, 102c with access to circuit- switched networks, such as the PSTN 108, to facilitate communications between the WTRUs 102a, 102b, 102c and traditional land-line communications devices.
[0049] The RNC 142a in the RAN 103 may also be connected to the SGSN 148 in the core network 106 via an IuPS interface. The SGSN 148 may be connected to the GGSN 150. The SGSN 148 and the GGSN 150 may provide the WTRUs 102a, 102b, 102c with access to packet-switched networks, such as the Internet 1 10, to facilitate communications between and the WTRUs 102a, 102b, 102c and IP-enabled devices.
[0050] As noted above, the core network 106 may also be connected to the networks 1 12, which may include other wired or wireless networks that are owned and/or operated by other service providers.
[0051] FIG. ID is a system diagram of the RAN 104 and the core network 107 according to an embodiment. As noted above, the RAN 104 may employ an E-UTRA radio technology to communicate with the WTRUs 102a, 102b, 102c over the air interface 1 16. The RAN 104 may also be in communication with the core network 107.
[0052] The RAN 104 may include eNode-Bs 160a, 160b, 160c, though it will be appreciated that the RAN 104 may include any number of eNode-Bs while remaining consistent with an embodiment. The eNode-Bs 160a, 160b, 160c may each include one or more transceivers for communicating with the WTRUs 102a, 102b, 102c over the air interface 116. In one embodiment, the eNode-Bs 160a, 160b, 160c may implement MIMO technology. Thus, the eNode-B 160a, for example, may use multiple antennas to transmit wireless signals to, and receive wireless signals from, the WTRU 102a.
[0053] Each of the eNode-Bs 160a, 160b, 160c may be associated with a particular cell (not shown) and may be configured to handle radio resource management decisions, handover decisions, scheduling of users in the uplink and/or downlink, and the like. As shown in FIG. ID, the eNode-Bs 160a, 160b, 160c may communicate with one another over an X2 interface.
[0054] The core network 107 shown in FIG. ID may include a mobility management gateway (MME) 162, a serving gateway 164, and a packet data network (PDN) gateway 166. While each of the foregoing elements are depicted as part of the core network 107, it will be appreciated that any one of these elements may be owned and/or operated by an entity other than the core network operator. [0055] The MME 162 may be connected to each of the eNode-Bs 160a, 160b, 160c in the RAN 104 via an SI interface and may serve as a control node. For example, the MME 162 may be responsible for authenticating users of the WTRUs 102a, 102b, 102c, bearer
activation/deactivation, selecting a particular serving gateway during an initial attach of the WTRUs 102a, 102b, 102c, and the like. The MME 162 may also provide a control plane function for switching between the RAN 104 and other RANs (not shown) that employ other radio technologies, such as GSM or WCDMA.
[0056] The serving gateway 164 may be connected to each of the eNode-Bs 160a, 160b, 160c in the RAN 104 via the SI interface. The serving gateway 164 may generally route and forward user data packets to/from the WTRUs 102a, 102b, 102c. The serving gateway 164 may also perform other functions, such as anchoring user planes during inter-eNode B handovers, triggering paging when downlink data is available for the WTRUs 102a, 102b, 102c, managing and storing contexts of the WTRUs 102a, 102b, 102c, and the like.
[0057] The serving gateway 164 may also be connected to the PDN gateway 166, which may provide the WTRUs 102a, 102b, 102c with access to packet-switched networks, such as the Internet 1 10, to facilitate communications between the WTRUs 102a, 102b, 102c and IP- enabled devices.
[0058] The core network 107 may facilitate communications with other networks. For example, the core network 107 may provide the WTRUs 102a, 102b, 102c with access to circuit- switched networks, such as the PSTN 108, to facilitate communications between the WTRUs 102a, 102b, 102c and traditional land-line communications devices. For example, the core network 107 may include, or may communicate with, an IP gateway (e.g., an IP multimedia subsystem (IMS) server) that serves as an interface between the core network 107 and the PSTN 108. In addition, the core network 107 may provide the WTRUs 102a, 102b, 102c with access to the networks 112, which may include other wired or wireless networks that are owned and/or operated by other service providers.
[0059] FIG. IE is a system diagram of the RAN 105 and the core network 109 according to an embodiment. The RAN 105 may be an access service network (ASN) that employs IEEE 802.16 radio technology to communicate with the WTRUs 102a, 102b, 102c over the air interface 117. As will be further discussed below, the communication links between the different functional entities of the WTRUs 102a, 102b, 102c, the RAN 105, and the core network 109 may be defined as reference points.
[0060] As shown in FIG. IE, the RAN 105 may include base stations 180a, 180b, 180c, and an ASN gateway 182, though it will be appreciated that the RAN 105 may include any number of base stations and ASN gateways while remaining consistent with an embodiment. The base stations 180a, 180b, 180c may each be associated with a particular cell (not shown) in the RAN 105 and may each include one or more transceivers for communicating with the WTRUs 102a, 102b, 102c over the air interface 117. In one embodiment, the base stations 180a, 180b, 180c may implement MIMO technology. Thus, the base station 180a, for example, may use multiple antennas to transmit wireless signals to, and receive wireless signals from, the WTRU 102a. The base stations 180a, 180b, 180c may also provide mobility management functions, such as handoff triggering, tunnel establishment, radio resource management, traffic classification, quality of service (QoS) policy enforcement, and the like. The ASN gateway 182 may serve as a traffic aggregation point and may be responsible for paging, caching of subscriber profiles, routing to the core network 109, and the like.
[0061] The air interface 117 between the WTRUs 102a, 102b, 102c and the RAN 105 may be defined as an Rl reference point that implements the IEEE 802.16 specification. In addition, each of the WTRUs 102a, 102b, 102c may establish a logical interface (not shown) with the core network 109. The logical interface between the WTRUs 102a, 102b, 102c and the core network 109 may be defined as an R2 reference point, which may be used for
authentication, authorization, IP host configuration management, and/or mobility management.
[0062] The communication link between each of the base stations 180a, 180b, 180c may be defined as an R8 reference point that includes protocols for facilitating WTRU handovers and the transfer of data between base stations. The communication link between the base stations 180a, 180b, 180c and the ASN gateway 182 may be defined as an R6 reference point. The R6 reference point may include protocols for facilitating mobility management based on mobility events associated with each of the WTRUs 102a, 102b, 102c.
[0063] As shown in FIG. IE, the RAN 105 may be connected to the core network 109. The communication link between the RAN 105 and the core network 109 may defined as an R3 reference point that includes protocols for facilitating data transfer and mobility management capabilities, for example. The core network 109 may include a mobile IP home agent (MIP-HA) 184, an authentication, authorization, accounting (AAA) server 186, and a gateway 188. While each of the foregoing elements are depicted as part of the core network 109, it will be appreciated that any one of these elements may be owned and/or operated by an entity other than the core network operator.
[0064] The MIP-HA may be responsible for IP address management, and may enable the WTRUs 102a, 102b, 102c to roam between different ASNs and/or different core networks.
The MIP-HA 184 may provide the WTRUs 102a, 102b, 102c with access to packet-switched networks, such as the Internet 1 10, to facilitate communications between the WTRUs 102a, 102b, 102c and IP-enabled devices. The AAA server 186 may be responsible for user authentication and for supporting user services. The gateway 188 may facilitate interworking with other networks. For example, the gateway 188 may provide the WTRUs 102a, 102b, 102c with access to circuit-switched networks, such as the PSTN 108, to facilitate communications between the WTRUs 102a, 102b, 102c and traditional land-line communications devices. In addition, the gateway 188 may provide the WTRUs 102a, 102b, 102c with access to the networks 1 12, which may include other wired or wireless networks that are owned and/or operated by other service providers.
[0065] Although not shown in FIG. IE, it will be appreciated that the RAN 105 may be connected to other ASNs and the core network 109 may be connected to other core networks. The communication link between the RAN 105 the other ASNs may be defined as an R4 reference point, which may include protocols for coordinating the mobility of the WTRUs 102a, 102b, 102c between the RAN 105 and the other ASNs. The communication link between the core network 109 and the other core networks may be defined as an R5 reference, which may include protocols for facilitating interworking between home core networks and visited core networks.
[0066] M2M Servers may provide M2M services for M2M devices. For example, an M2M server may send data to and receive data from an M2M device. For M2M device communicating with the M2M server via a 3GPP network (e.g., a cellular network), the M2M server may collect control information or data regarding the M2M device that is generated or maintained by the 3 GPP Core Network. Example control data may include, but is not limited to, mobility information (e.g., routing area information, location area information, tracking area information, etc.), connection information (e.g., PDP context information, IP address, other addressing information, network attach/detach data, etc.), security information (e.g.,
authentication information, cyphering information, security mode information, etc.), or any other information maintained or generated by a 3 GPP core network.
[0067] To send and receive data between a M2M server and a cellular network node of a 3GPP network, a connection may be established between an M2M server and the cellular network node. For example, the cellular network node may be a SGSN. The connection between the cellular network node and the M2M server may be a dedicated interface. The dedicated interface may be referred to herein as a GM2M interface. The GM2M interface may include a defined communications protocol stack. Control and/or data signals from an M2M device and an M2M server may be communicated via the dedicated interface. [0068] The cellular network node may determine that a device is a machine to machine device based on subscriber data. For example, the subscriber data may include an Access Point Name (APN), and the cellular network node may determine that a device is an M2M device based on the APN. The APN may be received from another cellular network node, for example a HLR. Subscriber data may be other data which may be used to identify a machine to machine device. For example, if the cellular network node has communicated with the M2M device in the past, it may store an indication that identifies the device as an M2M device. When the cellular network node receives subscriber data for the M2M device, such as a device identification or address, the indication may be used to determine that the device is an M2M device.
[0069] The M2M server may request control data such as the current status of a M2M device. For example, the M2M server may request control data such as an attach status, a routing area status, security mode status, authentication status, PDP context status, and/or the like. The control data may be based on mobility control information or connection control information. The request for control data may be sent to a cellular network node via the GM2M interface. The cellular network node may initiate a network control procedure based on the request from the M2M server. The cellular network node may send control information from the network control procedure to the M2M device via the GM2M interface.
[0070] The systems and methods disclosed herein may be described in relation to connecting an M2M Server to the SGSN of the 3 GPP Core Network. However, the systems and methods disclosed herein may be applicable to other connection implementations. As such, use of the concepts described herein may not be limited to connections relating to the SGSN of the 3 GPP Core Network. For example the interface may be between the M2M server and a GGSN. In another example the dedicated interface may be between the M2M server and a MME in an LTE network.
[0071] In a 3GPP network, an SGSN may include one or more logical interfaces for communication with various network nodes and entities. Exemplary interfaces with the SGSN may include one or more of the following:
Ga - SGSNO Charging Gateway Function (CGF)
Gb - SGSN Base Station Subsystem (BSS)
Gc - GGSNOHome Location Register (HLR)
Gd - SGSNO Short Message Service (SMS) Mobile Switching Center (MSC)
Ge - SGSNO GSM Service Control Function (SCF)
Gf - SGSNOEquipment Identity Register (EIR)
Gi - GGSNOPublic Data Network (PDN)
Gn - SGSNO GGSN Gp - GSN GPRS Support Node (GSN)
Gr - SGSN Home Location Register (HLR)
Gs - SGSNOMSC/Visitor Location register (VLR)
[0072] FIG. 2 illustrates an exemplary 3 GPP architecture including an M2M server 236 in accordance with an embodiment. As shown in FIG. 2, M2M Server 236 (which may be referred to as A Machine Type Communication (MTC) Server) may be integrated with a 3GPP network. For example, M2M server 236 may include an interface with SGSN 226. The interface may be referred to as a GM2M interface.
[0073] FIG. 2 illustrates how various network nodes and connected devices may communicate in a 3GPP network. For example, M2M Device/GW 202 may be a WTRU capable of connecting to a 3GPP network. M2M Device/GW 202 may be a M2M device, such as a sensor reporting data. In another example, M2M Device/GW 202 may be a gateway collecting information from various M2M devices in order to relay data to the 3 GPP network. M2M Device/GW 202 may include Generic Communication (xGC) interface 204 and Service
Capability (SC) 206. xGC 204 may be a communications interface that allows M2M
Device/GW 202 to communicate with a variety of devices, gateways, and/or networks using different communications protocols. SC 206 may be may provide service functions that may be shared by different applications or devices. For example, SC 206 may provide application enablement, reachability/addressing/repository functionality for applications, remote entity management, security, data retention, transaction management, compensation brokerage (charging), and/or act as an interworking proxy. SC 206 may provide other European
Telecommunications Standards Institute (ETSI) M2M service capabilities. In an embodiment, xGC 204 may be integrated as part of SC 206. M2M Device/GW 202 may also include WiFi interface 208, which may allow M2M Device/GW 202 to connect to WiFi networks. M2M Device/GW 202 may also include UMTS interface 210, which may facilitate M2M Device/GW 202 to connect to UMTS networks. The UMTS interface is exemplary, and M2M Device/GW 202 may also include interfaces for LTE networks, WiMax networks and the like.
[0074] M2M Device/GW 202 may be in communication with Femto Access Point (FAP) 212. FAP 212 may be part of a radio access network (RAN) which provides M2M Device/GW 202 with radio access to a 3GPP network. FAP 212 may include a Home NodeB or may include a traditional NodeB. FAP 212 may include other nodes which facilitate radio access to a 3 GPP network. For example, FAP 212 may include NodeB 214 and Radio Network Controller 216. NodeB 214 and Radio Network Controller 216 may be part of a RAN for a UMTS network. NodeB 214 may communicate with RNC 216 via an Iub interface. [0075] FAP 212 may communicate with Home NodeB (HNB) Gateway (GW) 218, for example via an Iuh interface. HNB GW 218 may act as a gateway between FAP 212 and the core network (CN) of a 3 GPP system. For example, HNB GW 218 may communicate with a 3 GPP CN via an Iu interface. Continuing with this example, HNB GW 218 may communicate with Circuit-Switched CN 220 via an lues interface. HNB GW 218 may communicate with Packet-Switched CN 224 via an Iups interface. CS CN 220 and PS CN 224 may be logical partitions of a 3 GPP CN. CS CN 229 may include MSC/VLR 222. MSC/VLR 222 may provide support for CS functionality for M2M Device/GW 202.
[0076] PS CN 224 may include SGSN 226. SGSN 226 may facilitate the delivery of data packets to and from WTRUs within a geographical or network service area. SGSN 226 may route and transfer packets, provide mobility management functionality, provide logical link management, authenticate WTRUs, provide fee charging services (such as billing user data), and the like. PSN CN 224 may include GGSN 228. GGSN 228 may facilitate operative
communication between a 3GPP network and external networks such as the Internet and X.25 networks. For example, GGSN 228 may communicate with Packet Data Network (PDN) 232, for example via a Gi interface. PDN 232 may be any packet-based communication network. In an example, PDN 232 may provide M2M Network Application (App) 234 with a packet-based communication link for communication with PS CN 224. M2M Network App 234 may be an application being executed by a computing device which is meant to communicate with M2M Device/GW 202 and/or M2M Server 236. M2M Network App 234 may communicate with PDN 232 via an mla interface, and may use various communication protocols such as a Constrained Application Protocol (CoAp), a Hypertext Transfer Protocol (HTTP), a Session Initiation Protocol (SIP), and/or the like. PS CN 224 may also include HLR 230, which may store location information and user profile information for devices in communication with the 3 GPP network. The user profile information may be an example of subscriber data.
[0077] M2M Server 236 may include Network Generic Communication (NGC) interface 240 and Network Applications Enablement (NAE) function 238. NAE 238 may serve a a contact point for M2M applications within the network. In an example, CS CN 220, PS CN
224, and M2M Server 236 may be part of an operator owned network. GM2M may be a logical interface between SGSN 226 and M2M Server 236. Control data and/or user data from M2M
Device/GW 202 may be communicated between SGSN 226 and M2M Server 236 via GM2M.
In an example embodiment, control data from M2M Device/GW 202 may be communicated from SGSN 226 to M2M Server 236, while user data from M2M Device/GW 202 may be communicated from SGSN 226 to M2M Server 236 via GGSN 228. For example, control data may be sent from M2M Device/GW 202 to FAP 212 via UMTS interface 210. The control data may be routed from FAP 212 to HNB GW 218. The control data may be routed from HNB GW 218 to SGSN 226. SGSN 226 may then communicate the control data to M2M Server 236 via the GM2M interface. Continuing with this example, user data from M2M Device/GW 202 may be routed from to SGSN 226 in a manner similar to control data. However, in this example user data may be routed from SGSN 226 to GGSN 228, for example, via the Gn interface. GGSN 228 may then route the user data from M2M Device/GW 202 to M2M server 236, for example via an mla interface. The user data may be received by M2M Server via NAE 238, NGC 240 or another interface.
[0078] In an example, the GM2M interface may be for the control path (e.g., registration, security functions, authentication, etc.). By allowing M2M Server 236 to communicate directly with SGSN 226, SGSN 226 may perform user registration with M2M Server 236 without communicating through other network nodes or entities. The direct communication may provide for more efficient signaling within the CN, for example during an Attach procedure. Signaling of attach, authentication, and authorization may be performed via the GM2M interface, and other signaling and data path communications may be performed via the Gi interface. M2M Server 236 may receive control information via the GM2M interface without M2M Device/GW 202 establishing a PDP Context Activation and/or registering with M2M Server 236. To communicate via the Gi interface, a PDP context between the network and a device may have been established. An interface between GGSN 228 and M2M Server 236 may also be established. For example the interface between GGSN 228 and M2M Server 236 may be utilized for data (payload) traffic.
[0079] Procedures may be defined to facilitate connection of an M2M Server to a 3GPP network. For example, an M2M server may be connected with the SGSN of the 3GPP Core Network, e.g., on the GM2M Interface. For example, charging and billing functions of the M2M server and or 3GPP network may be integrated via the GM2M interface. Additionally, signaling overhead may be reduced by allowing communication directly between the SGSN and the M2M Server rather than routing all communications through the GGSN.
[0080] An M2M Server that is integrated within a 3GPP core network may
communicate device specific information via the GM2M interface. The device specific information may be control information. For example, device identity information such as an
International mobile Subscriber Identity (IMSI), an International Mobile Equipment Identity
(IMEI), Packet Temporary Mobile Subscriber Identity (P-TMSI), and/or the like may be communicated via the GM2M interface. Location related information such as routing area (RA) information, location area (LA) information, tracking area (TA) information, and/or the like may be communicated via the GM2M interface. Security related information such integrity key, ciphering keys,, and/or the like may be communicated via the GM2M interface. PDP context related information such as IP addressed, PDP type, and/or the like may be communicated via the GM2M interface.
[0081] A SGSN may recognize communications from an M2M device as an M2M communication. The SGSN may recognize that M2M communications may be routed to an M2M server. The SGSN may identify a device or a communication from a device as M2M related based on subscriber information. The SGSN may be M2M aware to the extent that it may associate M2M information with 3G WTRU/UE information. In an example, the M2M device may refrain from sending an indication that is an M2M device in each message. In this example, the SGSN may recognize that information from the M2M is M2M information based on the identity of the M2M device. For example, the device identity information may be subscriber information. In another example, the SGSN may recognize that information from the M2M device is M2M information based on an indication in a received message. The indication may be subscriber information. Additionally, an M2M device may be in communication with multiple SGSNs via multiple GM2M interfaces.
[0082] Subscriber information may be used by a SGSN to identify a M2M device. For example, When an M2M device initiates an attach procedure, an HLR may send default Access Point Name (APN) information along with other subscriber data to the SGSN. The subscriber data including the APN may be used to identify a M2M device. For example, the SGSN may be configured with a M2M APN, and may compare the M2M APN with the received APN included in the subscriber data. If the SGSN M2M APN matches the received APN included in the subscriber data, the SGSN may recognize the device associated with the subscriber data as an M2M device. The M2M APN may indicate that a device is an M2M device. Thus, a device may omit an indication of its M2M status, as the SGSN may recognize the device as M2M capable based on subscriber data associated with the device.
[0083] An M2M Server and a 3GPP network may use a combined authentication procedure. For example, a M2M capable WTRU may carry out generation of a cypher key (Ck) and an integrity key (Ik) during authentication with the network. The M2M capable WTRU may also carry out generation of M2M Device Session Ciphering Key (KsCk) and M2M device
Session Integrity key (Kslk) as part of the same procedure. The authentication keys may be signaled to the network in one or more messages. The SGSN may receive the keys and forward the KsCk and Kslk to the M2M server via the GM2M interface. [0084] In another example, an M2M device may identify itself as M2M capable in a Mobility Management (MM) message, a Global Multimedia Mobility (GMM) message, a call control (CC) message, and/or a Session Management (SM) message. For example, an M2M device may set the 8th bit of a MM message, a GMM message, a CC message, and/or a SM message to "1" to indicate that tit is M2M capable. In another example, a device may indicate that it is M2M capable using the attach type field of in a GMM Attach request message. For example, the SGSN may receive an indication in the attach type field that the device is an M2M device and may store an indication of the M2M capability of the device in memory. In another example, the skip indicator filed of Layer 3 (L3) messages may be set to "11 11" to indicate that a device is M2M capable.
[0085] FIG. 3 illustrates an example communication protocol stack for GM2M interface 326. GM2M 326 may be a logical interface, for example if M2M Server 322 is integrated as part of SGSN 324. In this example, GM2M 326 may be an internal interface inside of SGSN 324. M2MAP 302 may be an M2M application part protocol layer for M2M Server 322. M2MAP 304 may be an M2M application part protocol layer for SGSN 324. UDP 306 and UDP 308 may form the user datagram protocol (UDP) layer for the GM2M interface. In an example, the UDP destination port for M2MAP messages may be 2859. UDP port 2859 may be the registered port for M2MAP. M2M Server 322 may also include IP layer 310, L2 layer 314, and LI layer 318. Similarly, SGSN 324 may include IP layer 312, L2 layer 316, and LI layer 320. SGSN 324 and M2M Server 322 may include publically addressable IP addresses.
[0086] M2MAP messages may have defined message formats with defined information elements. For example, Table 1, below, illustrates an exemplary M2MAP header. The contents of Table 1 may be fixed parts of the M2MAP header. The specific contents of each message (e.g., information elements) are discussed with reference to FIG. 4-11, below. For example, the protocol discriminator may use a value of "11 10."
Figure imgf000021_0001
Table 1: M2MAP Header
Table 2, below, is a list of example M2MAP message types. Bits
8 7 6 5 4 3 2 1
1 - M2MAP messages
1 0 0 0 0 0 0 1 M2M Device Attach Status Request
1 0 0 0 0 0 1 0 M2M Device Attach accept
1 0 0 0 0 0 1 1 M2M Device Attach complete
1 0 0 0 0 1 0 0 M2M Device Attach reject
1 0 0 0 0 1 0 1
1 0 0 0 0 1 1 0 M2M Device Detach accept
1 0 0 0 1 0 0 0 M2M Device Routing area Information Request
1 0 0 0 1 0 0 1 M2M Device Routing area update accept
1 0 0 0 1 0 1 0 M2M Device Routing area update complete
1 0 0 0 1 0 1 1 M2M Device Routing area update reject
1 0 0 0 1 1 0 0 M2M Device Security Mode Status Request
1 0 0 0 1 1 0 1 M2M Device Security Mode Complete
1 0 0 0 1 1 1 0 M2M Device Security Mode Reject
1 0 0 1 0 0 0 0 M2M Device Location Update
1 0 0 1 0 0 0 1 M2M Device Location Information Request
1 0 0 1 0 0 1 0 M2M Device Authentication and ciphering
Status Request
1 0 0 1 0 0 1 1 M2M Device Authentication and ciphering resp
1 0 0 1 0 1 0 0 M2M Device Authentication and ciphering rej
1 0 0 1 1 1 0 0 M2M Device Authentication and ciphering failure
1 0 0 1 0 1 0 1
1 0 0 1 0 1 1 0
1 0 1 0 0 0 0 0
1 0 1 0 0 0 0 1
1 1 0 0 0 0 0 1 M2M Device Activate PDP context Status request
1 1 0 0 0 0 1 0 M2M Device Activate PDP context accept
1 1 0 0 0 0 1 1 M2M Device Activate PDP context reject
1 1 0 0 0 1 0 0 M2M Device Request PDP context activation
1 1 0 0 0 1 0 1 M2M Device Request PDP context activation rej.
1 1 0 0 0 1 1 0 M2M Device Deactivate PDP context request
1 1 0 0 0 1 1 1 M2M Device Deactivate PDP context accept
1 1 0 0 1 0 0 0 M2M Device Modify PDP context
request(Network to MS direction)
1 1 0 0 1 0 0 1 M2M Device Modify PDP context accept (MS to network direction)
1 1 0 0 1 0 1 0 M2M Device Modify PDP context request(MS to network direction)
1 1 0 0 1 0 1 1 M2M Device Modify PDP context accept
(Network to MS direction)
1 1 0 0 1 1 0 0 M2M Device Modify PDP context reject
1 1 0 0 1 1 0 1
1 1 0 0 1 1 1 0
1 1 0 0 1 1 1 1
1 1 0 1 0 0 0 0
1 1 0 1 0 0 0 1
1 1 0 1 0 0 1 0
1 1 0 1 0 0 1 1
1 1 0 1 0 1 0 0
1 1 0 1 0 1 0 1
1 1 0 1 0 1 1 0 1 1 0 1 0 1 1 1
1 1 0 1 1 0 0 0
1 1 0 1 1 0 0 1
1 1 0 1 1 0 1 0
1 1 0 1 1 0 1 1
1 1 0 1 1 1 0 0
Table 2: M2MAP Message Types
[0087] FIG.4 illustrates an example attach procedure in accordance with an embodiment. For example the attach procedure may be a combined GPRS/IMSI Attach procedure. A Device Attach Update procedure may be defined in order to inform M2M Server 420 of MS/M2M 402 performing a successful or unsuccessful attach procedure. For example, MS/M2M 402 may send Attach Request 422 to New SGSN 406, for example via RAN 404. Attach Request 422 may include a IMSI, a P-TMSI, an old Routing Area Identity (RAI), a classmark, a Cyphering Key Sequence Number (CKSN), an Attach Type, Discontinuous reception (DRX) parameters, an old P-TMSI and/or the like. New SGSN 406 may send ID Request 424 to Old SGSN 408, for example to request a IMSI for MS/M2M 402 if it was omitted from the attach request, and in response may receive ID Response 426 which may identify MS/M2M 402, for example by IMSI. Alternatively, or supplemental to ID request 424, New SGSN 406 may send ID Request 428 to MS/M2M 402, for example to request a IMSI for MS/M2M 402 if it was omitted from the attach request, and in response may receive ID
Response 426 which may identify MS/M2M 402, for example by IMSI.
[0088] New SGSN 406 may facilitate Authentication 428 and Authentication 430 between MS/M2M 402 and HLR 416, respectively. If a PDP context had previously existed for MS/M2M 402, New SGSN 406 may send Delete PDP Context request 436 to GGSN 410. In response, GGSN 410 may send Delete PDP Context Response 438. New SGSN 406 may send Update Location 440 to HLR 416, for example, if a SGSN number has changed since a previous GPRS detach or if Attach Request 422 was the first attach request by MS/M2M 402. Update Location 440 may include a SGSN number, a SGSN address, an IMSI for MS/M2M 402, and/or IMEI software version (IMEISV). HLR 416 may send Cancel Location 442 to Old SGSN 408, for example to delete MM and PDP contexts. Old SGSN 408 may respond with Cancel Location ACK 442 upon cancellation of procedures related to MS/M2M 402. To delete an old PDP context, for example if the contexts have yet to be deleted, Old SGSN 408 may send Delete PDP Context request 44 to GGSN 410. GGSN may delete the old PDP context for MS/M2M 402 and respond with Delete PDP Context Response 436. [0089] HLR 416 may send Insert Subscriber Data 448 to New SGSN 406, which may include subscriber data for MS/M2M 402. The subscriber data may include an IMSI, GPRS subscription data and/or an APN for MS/M2M 402. The APN may be a default APN for M2M devices. At 449, New SGSN 406 may determine that MS/M2M 402 is an M2M capable device, for example based on the received APN. As an example, New SGSN 406 may compare the received APN with a default APN for M2M devices. New SGSN 406 may acknowledge the receipt of the subscriber data, for example by sending Insert Subscriber Data ACK 450. HLR 416 may acknowledge the creation of a new MM context and/or successful location update by sending Location update ACK 452 to New SGSN 406. Old SGSN 406 may inform New MSC/VLR 414 of the location update for MS/M2M 402 by sending Location update Request 454. If the location update is inter-MSC (i.e., more than one MSC is involved), New MSC/VLR 414 may send update Location 456 to HLR 416. HLR 416 may send Cancel Location 458 to Old MSC/VLR 418. Old MSC/VLR 418 may respond with Cancel Location ACK 460. HLR 416 may send Insert Subscriber Data 462 to New MSC/VLR 414, which may include subscriber data for MS/M2M 402. The subscriber data may include an IMSI, GPRS subscription data and/or an APN for MS/M2M 402. The APN may be a default APN for M2M devices. New MSC/VLR 414 may acknowledge the receipt of the subscriber data, for example by sending Insert
Subscriber Data ACK 464. HLR 416 may send update Location ACK 466 to New MSC/VLR 414. New MSC/VLR 414 may indicate location acceptance by sending Location Update Accept 468 to New SGSN 406.
[0090] New SGSN 406 may then process the location update by performing
Customized Applications for Mobile Network Logic (CAMEL) Procedures 470. New SGSN 406 may send Attach Accept 472 to MS/M2M 402 indicating that the attach procedure was successful and is complete. MS/M2M 402 may acknowledge Attach Accept 472 by sending Attach Complete 474. Optionally, New SGSN 406 may send TMSI Reallocation Complete 476, for example if VLR TMSI was changed.
[0091] Regardless of whether the attach procedure was successful or unsuccessful, New
SGSN 406 may send M2M Device Attach Update 478 to M2M server 420. M2M Device Attach
Update 478 may be sent from New SGSN 406 to M2M Server 420 via the GM2M interface. A
Device Attach message may use a skip indicator field to indicate it is an M2M procedure. The
SGSN may interpret the skip indicator field. In another embodiment, a WTRU may use an attach type field in GMM ATTACH REQUEST MESSAGE to indicate it is an M2M device.
The SGSN may interpret the type of attach field and send DEVICE ATTACH UPDATE to the
M2M Server at the end of attach procedure. [0092] There may be several types of M2M Device Attach Update messages that a SGSN may send to an M2M based on an attach procedure. For example, when an SGSN sends an Attach Accept Message to a M2M device, it may also send a M2M Device Attach Accept type M2M Device Attach Update message to the M2M Server via the GM2M interface. In another example, when an SGSN sends an Attach Reject Message to a M2M device, it may also send a M2M Device Attach Reject type M2M Device Attach Update message to the M2M Server via the GM2M interface. In yet another example, when the SGSN receives an Attach complete Message from an M2M device, it may send a M2M Device Attach Complete type M2M Device Attach Update message to the M2M server via the GM2M interface. Example information elements for M2M Device Attach Update messages (e.g., attach
accept/reject/complete type messages) are shown in Table 3, below.
Figure imgf000025_0001
Table 3: Information Elements for M2M Device Attach Update Messages
[0093] Additionally, a M2M server may send a M2M Device Attach Status Request message to a SGSN to determine an attach status of an M2M device. The M2M Device Attach Status Request message may be sent via the GM2M server to the SGSN. An example information element for a M2M Device Attach Status request messages is shown in Table 4, below.
Figure imgf000025_0002
Table 4: Information Elements for M2M Device Attach Status Messages
[0094] FIG.5 illustrates an example routing area update procedure in accordance with an embodiment. MS/M2M 502 may send Routing Area Update request 510 to SGSN 506. Routing Area Update Request 510 may indicate that MS/M2M 502 may have entered a new routing area or may be a periodic routing area update. Routing Area Update request 510 may include a P-TMSI, an old RAI, an old P-TMSI Signature, an Update Type and the like. Base Station Subsystem (BSS) 504 may add a Cell Global Identity prior to forwarding Routing Area Update Request 510 to SGSN 506. Security Functions 512 may be executed between MS/M2M 502 and SGSN 506. Upon validating that MS/M2M 502 is allowed in the new RA and updating MM contexts, SGSN 506 may send Routing Area update 514 to MS/M2M 502. SGSN 506 may perform CAMEL Procedures 516 to process the Routing Area Update. MS/M2M 502 may send Routing Area Update Confirm 518 to SGSN 506 to confirm the routing area update is complete. In an example, SGSN 506 may associate information from M2/M2M 502 with M2M
information. For example, the SGSN may have determined MS/M2M 502 was a M2M device in an earlier transaction (such as an attach). SGSN 506 may send M2M Routing Area Update 520 to M2M Server 508, for example via the GM2M interface.
[0095] There may be several types of M2M Device Routing Area Update messages that a SGSN may send to an M2M server based on a Routing Area procedure. For example, when an SGSN sends a Routing Area Update Accept Message to a M2M device, it may also send a M2M Device Routing Area Update Accept type M2M Device Routing Area Update message to the M2M Server via the GM2M interface. In another example, when an SGSN sends a Routing Area Update Reject Message to a M2M device, it may also send a M2M Device Routing Area Update Reject type M2M Device Routing Area Update message to the M2M Server via the GM2M interface. In yet another example, when the SGSN receives a Routing Area Update Complete message from a M2M device, it may send a M2M Device Routing Area Update Complete type M2M Device Routing Area Update message to the M2M server via the GM2M interface. Example information elements for M2M Device Routing Area Update messages (e.g., Routing Area Update Accept/Reject/Complete type messages) are shown in Table 5, below.
Figure imgf000026_0001
Table 5: Information Element for M2M Device Routing Area Update Message
[0096] Additionally, a M2M server may send a M2M Device Routing Area Information Request message to a SGSN to determine routing area information status of an M2M device. The M2M Device Routing Area Information Request message may be sent via the GM2M interface. An example information element for a M2M Device Routing Area Information Request message is shown in Table 6, below.
Figure imgf000026_0002
Table 6: Information Elements for M2M Device Routing Area Information Request
Messages [0097] FIG.6 illustrates an example PDP Context Update procedure in accordance with an embodiment. MS/M2M 602 may send Activate PDP Context Request 612 to SGSN 606. Activate PDP Context Request 612 may include a Network Service Access Point Identifier (NSAPI), a Transaction Identifier (TI), a PDP type, a PDP Address, an APN, a Quality of Service (QoS) Request, Protocol Configuration options of the like. At 613, SGSN 606 may determine that MS/M2M 602 is M2M capable, for example based on a received APN, IMSI or other identifier. SGSN 606 may perform CAMEL Procedures 614 to process Activate PDP Context Request 612 and PDP Context establishment. SGSN 606 may validate thee PDP Context request. If SGSN 606 is unable to validate the request, it may send MS/M2M 602 an Activate PDP Context Reject Message (Not shown in FIG. 6). However, to create the PDP Context, SGSN 606 may send Create PDP Context Request 616 to GGSN 608. GGSN 608 may choose to accept or reject the request. If accepted, GGSN 608 may send Create PDP Context Response 618 to SGSN 606.
[0098] MS/M2M 602, RAN 604 and SGSN 606 may engage in Radio Access Bearer Setup 620. If BSS trace is activated, SGSN may send Invoke trace 622 to RAN 604. SGSN 606 may also send Update PDP Context request 624 to GGSN 608, for example if during Radio Access Bearer Setup 620 there was a QOS change for MS/M2M 602. If so, GGSN may respond with Update PDP Context Response 626. SGSN 606 may perform further CAMEL Procedures 628 to acknowledge PDP Context establishment. SGSN may send Activate PDP Context Accept 630 to MS/M2M 602, which may indicate that a PDP context was successfully established. Following transfer of Activate PDP Context Accept 630 to MS/M2M 602, SGSN 606 may send PDP Context Update 632 to M2M Server 610 to inform M2M Server 610 of the new PDP Context for MS/M2M 602. PDP Context Update 632 may be sent via the GM2M interface.
[0099] There may be several types of M2M Device PDP Context Activation Update messages that a SGSN may send to an M2M Server based on a Routing Area procedure. For example, when a SGSN sends an Activate PDP Context Accept message to a M2M device, it may also send a M2M Device Activate PDP Context Accept type M2M Device PDP Context
Activation Update message to the M2M Server via the GM2M interface. In another example, when an SGSN sends an Activate PDP Context Reject Message to a M2M device, it may also send a M2M Device Activate PDP Context Reject type M2M Device PDP Context Activation
Update message to the M2M Server via the GM2M interface. In yet another example, when the
SGSN receives a Modify PDP Context Accept message from a M2M device, it may send a M2M
Device Modify PDP Context Accept type M2M Device PDP Context Activation Update message to the M2M server via the GM2M interface. Similarly, a SGSN may send a Modify PDP Context Accept message to a M2M device, in which case it may still send a M2M Device Modify PDP Context Accept type M2M Device PDP Context Activation Update message to the M2M server via the GM2M interface. A SGSN may also send or receive a Modify PDP Context Reject message, and in either case the SGSN may send a M2M Device Modify PDP Context Reject type M2M Device PDP Context Activation Update message to the M2M server via the GM2M interface. Example information elements for M2M Device PDP Context Activation Update messages are shown in Table 7, below.
Figure imgf000028_0001
Table 7: Information Element for M2M Device PDP Context Activation Update Message
[0100] FIG.7 illustrates an example device detach procedure in accordance with an embodiment. MS/M2M 702 may send Detach Request 714 to SGSN 706. Detach Request 714 may indicate that MS/M2M 502 desires to detach from the network and may include a detach type, a P-TMSI, a P-TSMI signature, a switch off notification and/or the like. SGSN 706 may send GGSN 708 Delete PDP Context Request 714. In response, GGSN 708 may delete the PDP Context for MS/M2M 702 and send SGSN 706 Delete PDP Context response 716. SGSN 706 may perform CAMEL Procedures 718 to process the PDP Context deletion. SGSN 706 may send IMSI Detach Indication 720 to MSC/VLR 710, for example if Detach Request 714 indicates that the detach procedure is an IMSI detach procedure. SGSN 706 may send GPRS Detach Indication 722 to MSC/VLR 710, for example if Detach Request 714 indicates that the detach procedure is a GPRS detach procedure. SGSN 706 may perform CAMEL Procedures 724 to process detach. SGSN 706 may send Detach Accept 726 to MS/M2M 702 to indicate the detach procedure was successful. SGSN 706 may send M2M Device Detach Update 728 to M2M Server 712, for example via the GM2M interface, in order to inform M2M Server 712 of the detach procedure. MS/M2M 702, BSS/UTRAN 704, and/or SGSN 706 may also perform PS Signaling Connection Release 730. Example information elements for M2M Device Detach Accept Messages are shown in Table 8, below. ΙΕΙ Information Element Type/Reference Presence Format Length
P-TMSI or IMSI Mobile identity M LV 6 - 9
GMM cause GMM cause 0 V 1
Table 8: Information Element for M2M Device Detach Update Message
[0101] FIG. 8 illustrates an example authentication and key agreement procedure in accordance with an embodiment. The authentication and key agreement procedure may begin with distribution of authentication vectors from Home Environment (HE) to the Serving Network (SN) at 810. VLR/SGSN 804 may send Authentication Data Request 812 to HE/HLR 806. In response, at 814 HE/HLR 806 may generate authentication vectors and transmit the
authentication vectors to VLR/SGSN 804 as part of Authentication data response 816. Each authentication vector may include a random number (RAND), an expected response (XRES), a cipher key (CK), an integrity key (IK), and an authentication token (AUTH). At 818,
VLR SGSN 804 may store the authentication vectors.
[0102] At 820, MS/M2M 802 and VLR/SGSN 804 may engage in authentication and key establishment. VLR/SGSN 804 may select an authentication vector (AV), for example the ith AV (AV(i)), where n may be the number of authentication vectors and 1 <= i <= n.
VLR/SGSN 804 may transmit user authentication request 824 to MS/M2M 802. User authentication request 824 may include RAND(i) and AUTH(i), which may be the random number and the authentication token for AV(i), respectively. At 826, MS/M2M 802 may verify AUTN(i), for example by checking a Universal Subscriber Identity Module (USIM), and may compute a response based on AV9I) (RES(i)). MS/M2M 802 may send RES(i) to VLR/SGSN 804 as part of User authentications response 828. At 830, VLR/SGSN 804 may compare RES(i) and XRES(i). If RES® and XRES(i) match, VLR/SGSN 804 may consider the authentication and key agreement exchange to be successfully completed. At 832, VLR/SGSN 804 may select CK(i) and IK(i) as the cyphering and integrity keys. Similarly, at 834, MS/M2M 802 may compute CK(i) and IK(i). VLR/SGSN 804 may send M2M Device Authentication and Key Update 836 to M2M Server 808, for example via the GM2M interface, to inform M2M Server of the successful authentication and key agreement.
[0103] There may be several types of M2M Device Authentication and Key Agreement Update messages that a SGSN may send to an M2M server based on an authentication, key agreement and/or cyphering procedure. For example, when a SGSN receives an Authentication and Key Agreement Response Message from a M2M device, it may also send a M2M Device Authentication and Key Agreement Response type M2M Device Authentication and Key Agreement Update message to the M2M Server via the GM2M interface. In another example, when an SGSN receives an Authentication and Key Agreement Reject Message from a M2M device, it may also send a M2M Device Authentication and Key Agreement Reject Message type M2M Device Authentication and Key Agreement Update message to the M2M Server via the GM2M interface. In yet another example, when the SGSN receives an Authentication and Key Agreement Failure Message from a M2M device, it may send a M2M Device Ro Authentication and Key Agreement Failure type M2M Device Authentication and Key Agreement Update message to the M2M server via the GM2M interface. Example information elements for M2M Device Authentication and Key Agreement Update messages (e.g., Authentication and Key Agreement Failure/Accept/Reject type messages) are shown in Table 9, below. As an example a reject message may include a reject reason and/or the ciphering and/or integrity keys.
Figure imgf000030_0001
Table 9: Information Elements for M2M Device Authentication and Key Agreement
Update Messages
[0104] Additionally, a M2M server may send a M2M Device Authentication and Key Agreement Request message to a SGSN to determine authentication and key agreement status of an M2M device. The M2M Device Authentication and Key Agreement Request message may be sent via the GM2M interface. An example information element for a M2M Device
Authentication and Key Agreement Request message is shown in Table 10, below.
Figure imgf000030_0002
Table 10: Information Element for M2M Device Authentication and Key Agreement
Request Messages
[0105] FIG. 9 illustrates an example security mode update procedure in accordance with an embodiment. At 910, Radio Resource Control (RRC) Connection Establishment may be performed between MS/M2M 902 and Serving Radio Network Controller (SRNC) 904. At 912, SRNC 904 may store Hyper Frame Number (HFN) START values and UE Security Capability. MSM/M2M 902 may send Initial L3 Message 914 to VLR/SGSN 906. For example, Initial L3 Message 914 may be a location update request, a Connection Management (CM) service request a routing area update request, an attach request, a paging response, or the like. At 916, MS/M2M 902 may perform authentication and key generation, for example, as described with respect to FIG. 8. At 918, VLR/SGSN 906 may decide allowed UE cyphering capabilities (UIAs) and integrity capabilities (UEAs). VLR/SGSN 906 may send Security Mode Command 920 to SRNC 904, which may include UIAs, IK, UEAs, CK, and/or the like. At 922, SRNC 904 may generate a random value (FRESH) and may initiate downlink integrity protection.
[0106] SRNC 904 may send Security Mode Command 924 to MS/M2M 902. Security Mode Command 924 may include a CN domain, a UIA, FRESH, a UE security capability, UEA, Message Authentication Code for Integrity (MAC-I), and/or the like. At 928, MS/M2M may verify the message and start integrity security. MS/M2M 902 may indicate that the security mode procedure was successful by sending Security Mode Complete 930. At 932, SRNC 904 may verify Security Mode Complete 930 has been received. SRNC 904 may send Security Mode Complete to VLR/SRNC 906. At 936, MS/M2M 902 may start cyphering/deciphering. At 938, SRNC 904 may start cyphering/deciphering. VLR/SRNC 906 may send M2M Device Security Mode Update 940 to M2M Server 908, for example via the GM2M interface.
[0107] There may be several types of M2M Device Security Mode Update messages that a SGSN may send to an M2M server based on a security mode procedure. For example, when a SGSN receives a Security Mode Complete Message from a RNC, it may also send a M2M Device Security Mode Complete type M2M Device Security Mode Update message to the M2M Server via the GM2M interface. In another example, when an SGSN receives a Security Mode Reject Message from a RNC, it may also send a M2M Device Security Mode Reject Message type M2M Device Security Mode Update message to the M2M Server via the GM2M interface. Example information elements for M2M Device Authentication and Key Agreement Update messages (e.g., Authentication and Key Agreement Failure/Accept/Reject type messages) are shown in Table 9, below. As an example, SGSN may store an indication that the M2M device is M2M capable from an earlier communication session.
Figure imgf000031_0001
Table 11: Information Elements for M2M Device Security Mode Update Messages
[0108] Additionally, a M2M server may send a M2M Security Request message to a SGSN to determine security mode status of an M2M device. The M2M Device Security Mode Request message may be sent via the GM2M interface. An example information element for a M2M Device Security Mode Request message is shown in Table 12, below. ΙΕΙ Information Element Type/Reference Presence Format Length
IMSI Mobile identity M LV 6 - 9
Table 12: Information Element for M2M Device Security Mode Request Messages
[0109] FIG. 10 illustrates an example location reporting control procedure in accordance with an embodiment. SGSN 1006 may send Location Reporting Control 1010 to RAN 1004. For example, SGSN 1006 may send Location reporting Control 1010 because it detects form subscriber data for MS/M2M 1002 that SGSN 1006 should monitor the service area in which MS/M2M 1002 is located. Location reporting Control 1010 may trigger a periodic or standalone report about the current location of MS/M2M 1002. RAN 1004 may store the report, for example if periodic reporting is requested. In another example, SGSN 1006 may request to be notified if MS/M2M 1002 moves into or out of a determined service region. At 1012, MS/M2M 1002 may move to a new service location, which may be in a reporting area request in Location Reporting Control 1010. RAN 1004 may determine the location of MS/M2M 1002 and send Location report 1014 to SGSN 1006. SGSN 1006 may inform M2M server 1008 of the location of MS/M2M 1002. For example, SGSN 1006 may send M2M Device Location Report Update 1016 to M2M Server 1008, for example via the GM2M interface. Optionally, SGSN 1006 may cancel an early location report request, for example by sending Cancel Location reporting 1018 to RAN 1004. Example information elements for M2M Device Location Report Update messages are shown in Table 9, below. As an example, SGSN may store an indication that the M2M device is M2M capable from an earlier communication session.
Figure imgf000032_0001
Table 13: Information Elements for M2M Device Location Reporting Update Messages
[0110] Additionally, a M2M server may send a M2M Security Request message to a SGSN to request a location report status of an M2M device. The M2M Device Location Reporting Request message may be sent via the GM2M interface. An example information element for a M2M Device Location Reporting Request message is shown in Table 12, below.
Figure imgf000032_0002
Table 14: Information Element for M2M Device Location Reporting Request Messages [0111] FIG. 1 1 illustrates an example network initiated PDP Context Activation procedure in accordance with an embodiment. In this example, the control procedure may be initiated by M2M Server 11 10 or may be initiated by a cellular network node. For example, if M2M server 11 10 is initiating a network control procedure (for example a PDP context activation procedure as shown in FIG. 1 1), M2M Server 110 may send Request 1 109 to SGSN 1 104, for example via the GM2M interface. Request 1109 may be a M2M Device PDP Context Activation/Modification Request Message. SGSN 1104 may send Request Initiation 11 1 1 to GGSN 1 108 which may initiate a network control procedure such as a PDP context activation procedure. In another example, the PDP context activation procedure may be initiated by a cellular network node. In this example, GGSN 1108 may receive PDP Protocol Data Unit (PDU) 11 12 from the cellular network node. In another examplee, PDP PDU 1 112 may be sent from M2M Server 11 10 directly to GGSN 1108.
[0112] GGSN 1 108 may determine if a Network-requested PDP Context Activation procedure should be activated. GGSN 1 108 may send Send Routeing Information for GPRS 114 to HLR 1106. If HLR 1106 determined the request may be served, HLR 1 10 may send Send Routeing Information for GPRS ACK 11 16 to GGSN 1108. GGSN 1 108 may send PDU Notification Request 1 1 18 to SGSN 1104, whose identity may be indicated by HLR 1106. SGSN 1 104 may send PDU Notification Response 1120, which may indicate that it will inform MS/M2M 1102 to activate the PDP context indicated. SGSN 1 104 may send Request PDP Context Activation 1124 to MS/M2M 1 102. Upon receipt of Request PDP Context Activation 1 124, MS/M2M 1102 may perform PDP Context Activation Procedure 1126 with GGSN 1 108. Upon successful completion of PDP Context Activation Procedure 1 126 (or unsuccessful completion), SGSN 1 104 may send PDP Context Update 1 128 to M2M Server 1 110, for example via the GM2M interface. Example information elements for PDP Context
Activation/Modification Request Messages are shown in Table 15, below.
Figure imgf000033_0001
Table 15: Information Elements for M2M Device Location Reporting Update Messages
[0113] Additionally, a SGSN may send a M2M Device PDP Context Deactivation update to a M2M server, for example upon the completion of a successful PDP context deactivation procedure. There may be several types of M2M Device PDP Context Deactivation messages that a SGSN may send to an M2M server based on a PDP deactivation procedure. For example, when a SGSN receives a Deactivate PDP Context Request Message from a M2M device, it may also send a M2M Device Deactivate PDP Context Request type M2M Device PDP Context Deactivation Update message to the M2M Server via the GM2M interface. In another example, when an SGSN sends a Deactivate PDP Context Accept Message to a M2M device, it may also send a M2M Device Deactivate PDP Context Accept Message type M2M Device PDP Context Deactivation Update message to the M2M Server via the GM2M interface.
Example information elements for M2M Device DP Context Deactivation Update messages (e.g., Deactivate PDP Context Accept/Complete type messages) are shown in Table 16, below.
Figure imgf000034_0001
Table 16: Information Elements for M2M Device PDP Context Deactivation Update
Messages
[0114] In another example, a network node, such as a M2M server, may initiate a PDP Context Deactivation Request. For example, a M2M server may send a M2M Device PDP Context Deactivation Request to a SGSN. Upon receiving the M2M Device PDP Context Deactivation request from the M2M server, the SGSN may start a PDP context deactivation procedure. Example information elements for M2M Device PDP Context Deactivation Update messages (e.g., Deactivate PDP Context Accept/Complete type messages) are shown in Table 17, below.
Figure imgf000034_0002
Table 17: Information Elements for M2M Device PDP Context Deactivation Request
Messages
[0115] In another example, a M2M server may initiate a PDP Context Information Request. For example, a M2M server may send a M2M Device PDP Context Information Request to a SGSN to request PDP context status of a M2M device. Upon receiving the M2 M2M Device PDP Context Information Request from the M2M server, the SGSN may treat the request a M2M PDP Context Activation Update message. Example information elements for M2M Device PDP Context Information Request messages are shown in Table 18, below. ΙΕΙ Information Element Type/Reference Presence Format Length
IMSI Mobile identity M LV 6 - 9
Negotiated QoS Quality of service M LV 13-17
Radio priority Radio priority M V 1/2
PDP address Packet data protocol address 0 TLV 4-20
SM cause SM Cause M V 1
Table 18: Information Elements for M2M Device PDP Context Information Request
Messages
[0116] For each of the aforementioned "request" messages originating from a M2M server and sent to a SGSN via the GM2M interface, a timeout may be employed. The timeout may be multiple of 1 second, and in an embodiment may not exceed 60 seconds. For the case in which no response is received within the timeout, the procedure may be cancelled and/or reinitiated.
[0117] Although features and elements are described above in particular combinations, one of ordinary skill in the art will appreciate that each feature or element can be used alone or in any combination with the other features and elements. In addition, the methods described herein may be implemented in a computer program, software, or firmware incorporated in a computer- readable medium for execution by a computer or processor. Examples of computer-readable media include electronic signals (transmitted over wired or wireless connections) and computer- readable storage media. Examples of computer-readable storage media include, but are not limited to, a read only memory (ROM), a random access memory (RAM), a register, cache memory, semiconductor memory devices, magnetic media such as internal hard disks and removable disks, magneto-optical media, and optical media such as CD-ROM disks, and digital versatile disks (DVDs). A processor in association with software may be used to implement a radio frequency transceiver for use in a WTRU, UE, terminal, base station, RNC, or any host computer.
* * *

Claims

What is Claimed:
1. A method for communicating cellular network data to a machine to machine server, the method comprising:
receiving subscriber data and control data at a cellular network node, wherein the control data facilitates a network control procedure and the subscriber data identifies a device involved in the network control procedure;
determining that the device involved in the network control procedure is a machine to machine device based on the subscriber data; and
sending the control data to a machine to machine server using a message sent via a dedicated interface with the machine to machine server.
2. The method of claim 1, wherein the subscriber data includes an Access Point Name (APN).
3. The method of claim 2, wherein the determination that the device involved in the network control procedure is a machine to machine device comprises determining the APN is included on a list of APNs associated with machine to machine devices.
4. The method of claim 1, wherein the network control procedure is a network attach procedure, a network detach procedure, an authentication procedure, a security mode procedure, a Packet Data Protocol (PDP) context procedure, a location area update procedure, a routing area update procedure, or a tracking area update procedure.
5. The method of claim 1, wherein sending the control data to the machine to machine server is performed without establishing a Packet Data Protocol (PDP) context for the machine to machine server.
6. The method of claim 1, wherein the cellular network node is a Serving General Packet Radio Service (GPRS) Support Node (SGSN).
7. The method of claims 1, wherein the control data is received from the machine to machine device and the subscriber data is received from a Home Location Register (HLR).
8. The method of claim 1, further comprising receiving a request from the machine to machine server for a status of the machine to machine device via the dedicated interface.
9. The method of claim 8, further comprising sending control status data to the machine to machine server via the dedicated interface.
10. A cellular network node comprising:
a first interface configured to receive subscriber data;
a second interface configured to receive control data, wherein the control data facilitates a network control procedure;
a processor configured to determine, based on the subscriber data, that a device involved in the network control procedure is a machine to machine device; and
a third interface configured to send a message including the control data, wherein the third interface is a dedicated interface between the cellular network node and a machine to machine server.
1 1. The cellular network node of claim 10, wherein the cellular network node is a Serving General Packet Radio Service (GPRS) Support Node (SGSN).
12. The cellular network node of claim 10, wherein the subscriber data includes an Access Point Name (APN).
13. The cellular network node of claim 12, further comprising memory for storing a list of APNs associated with machine to machine devices, wherein the processor determination that the device that the device involved in the network control procedure is a machine to machine device comprises determining the APN is included on the list of APNs associated with machine to machine devices.
14. The cellular network node of claim 10, wherein the network control procedure is a network attach procedure or a network detach procedure.
15. The cellular network node of claim 10, wherein the third interface is further configured to send the control data to the machine to machine server without a Packet Data Protocol (PDP) context being established for the machine to machine server.
16. The cellular network node of claim 1 1, wherein the second interface is further configured to receive the control data from the machine to machine device, and the first interface is further configured to receive the subscriber data from a Home Location Register (HLR).
17. The cellular network node of claim 10, wherein the third interface is further configured to receive a request from the machine to machine server for the machine to machine device to perform a subsequent network control procedure.
18. The cellular network node of claim 17, wherein the third interface is further configured to send subsequent control data from the subsequent network control procedure to the machine to machine server.
19. A method for a requesting the initiation of a network control procedure for a machine to machine device, the method comprising: :
receiving a request to initiate a network control procedure for a machine to machine device from a machine to machine server via a dedicated interface;
sending a message to a cellular network node that initiates the network control procedure; receiving control data for the machine to machine device as part of the network control procedure; and
sending the control data to the machine to machine server via the dedicated interface .
20. The method of claim 19, wherein the network control procedure is a network attach procedure or a network detach procedure., an authentication procedure, a security mode procedure, a Packet Data Protocol (PDP) context procedure, a location area update procedure, a routing area update procedure, or a tracking area update procedure.
21. The method of claim 19, wherein the machine to machine device does not establish a Packet Data Protocol (PDP) context with any cellular network node.
22. The method of claim 19, wherein the network control procedure is an authentication procedure, a security mode procedure, a Packet Data Protocol (PDP) context procedure, a location area update procedure, a routing area update procedure, or a tracking area update procedure.
23. The method of claim 19, wherein control plane data is communicated is communicated to the machine to machine server via the dedicated interface and user plane data is communicated to the machine to machine server via a Gateway General Packet Radio Service (GPRS) Support Node (GGSN).
PCT/US2011/041767 2010-06-25 2011-06-24 Interface of an m2m server with the 3gpp core network WO2011163561A1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
US13/806,450 US9736873B2 (en) 2010-06-25 2011-06-24 Interface of an M2M server with the 3GPP core network
US15/643,411 US20170311363A1 (en) 2010-06-25 2017-07-06 Interface of an m2m server with the 3gpp core network
US17/184,070 US11706598B2 (en) 2010-06-25 2021-02-24 Interface of an M2M server with the 3GPP core network
US18/352,408 US20240022885A1 (en) 2010-06-25 2023-07-14 Interface of an m2m server with the 3gpp core network

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US35868810P 2010-06-25 2010-06-25
US61/358,688 2010-06-25

Related Child Applications (2)

Application Number Title Priority Date Filing Date
US13/806,450 A-371-Of-International US9736873B2 (en) 2010-06-25 2011-06-24 Interface of an M2M server with the 3GPP core network
US15/643,411 Continuation US20170311363A1 (en) 2010-06-25 2017-07-06 Interface of an m2m server with the 3gpp core network

Publications (1)

Publication Number Publication Date
WO2011163561A1 true WO2011163561A1 (en) 2011-12-29

Family

ID=44588168

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2011/041767 WO2011163561A1 (en) 2010-06-25 2011-06-24 Interface of an m2m server with the 3gpp core network

Country Status (2)

Country Link
US (4) US9736873B2 (en)
WO (1) WO2011163561A1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104104528A (en) * 2013-04-03 2014-10-15 株式会社日立制作所 Registration management device and registration management method for M2M platform
EP2890073A1 (en) * 2013-12-31 2015-07-01 Gemalto SA System and method for securing machine-to-machine communications
GB2529391A (en) * 2014-08-12 2016-02-24 Vodafone Ip Licensing Ltd Machine-to-machine cellular communication security
US9755882B2 (en) * 2011-11-04 2017-09-05 Intel Corporation Small data techniques and configurations in a wireless communication network
US9992670B2 (en) 2014-08-12 2018-06-05 Vodafone Ip Licensing Limited Machine-to-machine cellular communication security
CN110213744A (en) * 2019-05-31 2019-09-06 恒宝股份有限公司 A kind of smart card realizes the method, apparatus and smart card of M2M business
US11811740B2 (en) 2015-07-02 2023-11-07 Convida Wireless, Llc Content security at service layer

Families Citing this family (42)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5443625B2 (en) * 2010-03-01 2014-03-19 インターデイジタル パテント ホールディングス インコーポレイテッド Machine-to-machine gateway architecture and functionality
WO2012025670A1 (en) * 2010-08-27 2012-03-01 Nokia Corporation Methods and apparatuses for facilitating quality of service control
US9148830B1 (en) * 2011-07-06 2015-09-29 Sprint Communications Company L.P. Reverse link throughput using multiple input multiple output (MIMO) across multiple wireless devices
WO2013007314A1 (en) * 2011-07-14 2013-01-17 Telefonaktiebolaget L M Ericsson (Publ) Handling device generated data
US20130058209A1 (en) * 2011-09-01 2013-03-07 Telefonaktiebolaget L M Ericsson (Publ) System and method for high availability machine-to-machine management
US9232342B2 (en) 2011-10-24 2016-01-05 Interdigital Patent Holdings, Inc. Methods, systems and apparatuses for application service layer (ASL) inter-networking
WO2013060387A1 (en) * 2011-10-28 2013-05-02 Telefonaktiebolaget L M Ericsson (Publ) Processing usage information for machine-to-machine communication
US9497102B2 (en) * 2011-12-06 2016-11-15 Qualcomm Incorporated Systems and methods for machine to machine device control and triggering
WO2013089452A1 (en) * 2011-12-13 2013-06-20 엘지전자 주식회사 Method and device for providing a proximity service in a wireless communication system
ES2612502T3 (en) 2011-12-19 2017-05-17 Huawei Technologies Co., Ltd. Method and device for controlling the context emission of packet data protocol (PDP)
KR101549029B1 (en) * 2011-12-20 2015-09-11 엘지전자 주식회사 User equipment-initiated control method and apparatus for providing proximity service
US9560162B2 (en) * 2012-04-09 2017-01-31 Telefonaktiebolaget Lm Ericsson (Publ) Quality of service support for machine-to-machine applications including e-health
PL2658333T3 (en) * 2012-04-26 2016-03-31 Belgacom Int Carrier Services System and method for APN correction in GTP messages associated with GPRS data services offered by mobile operator using a sponsor network
FI125393B (en) * 2012-07-17 2015-09-30 Arm Finland Oy A method, apparatus and system for use in a web service
US10178528B2 (en) * 2012-07-27 2019-01-08 Telefonaktiebolaget Lm Ericsson (Publ) Device connectivity management for machine type communications
US8938731B2 (en) * 2012-10-24 2015-01-20 Telefonaktiebolaget L M Ericsson (Publ) Cost optimization for firmware updates for globally mobile machine-to-machine devices
JP5961769B2 (en) * 2013-01-04 2016-08-02 インターデイジタル パテント ホールディングス インコーポレイテッド Method and apparatus for processing service layer detach command and attach notification
US9215549B2 (en) 2013-02-13 2015-12-15 Aeris Communications, Inc. Method for delivering machine to machine (M2M) application control data over control plane in LTE/EPS utilizing standard bearer management procedures
US10834557B2 (en) 2013-02-13 2020-11-10 Aeris Communications, Inc. Layered machine to machine (M2M) service methodology using class-based access point names (APNs) for the internet of things
EP3557894B1 (en) * 2013-05-06 2023-12-27 Convida Wireless, LLC Device triggering
US10104703B2 (en) * 2013-05-14 2018-10-16 Telefonaktiebolaget Lm Ericsson (Publ) Node and method for establishing direct communications
EP3000219B1 (en) * 2013-05-20 2020-09-30 Nokia Technologies Oy Access to data source via proxy
US20140376426A1 (en) * 2013-06-20 2014-12-25 Gary David Boudreau Machine type communication aggregator apparatus and method
GB2518254B (en) * 2013-09-13 2020-12-16 Vodafone Ip Licensing Ltd Communicating with a machine to machine device
CN104717600B (en) * 2013-12-16 2019-12-10 中兴通讯股份有限公司 M2M terminal/terminal peripheral accessibility management method and equipment
EP3143781B1 (en) * 2014-05-14 2019-12-11 Telefonaktiebolaget LM Ericsson (publ) Periodic management stabilization for internet of things
US10135678B2 (en) * 2014-06-13 2018-11-20 Telefonaktiebolaget Lm Ericsson (Publ) Mobile network IOT convergence
US10212030B2 (en) * 2014-06-13 2019-02-19 Telefonaktiebolaget Lm Ericsson (Publ) Mobile network IOT convergence
US9554392B2 (en) 2014-10-15 2017-01-24 At&T Intellectual Property I, L.P. Machine to machine traffic management methods and systems
US9838258B2 (en) 2014-12-04 2017-12-05 At&T Intellectual Property I, L.P. Network service interface for machine-to-machine applications
US10778697B2 (en) * 2015-06-23 2020-09-15 Lg Electronics Inc. Method for transmitting/receiving data in wireless communication system, and device for same
CN106413030B (en) * 2015-08-03 2019-11-08 北京国双科技有限公司 A kind of acquisition methods and device of routing area updating RAU indication information
US9961712B2 (en) * 2015-10-27 2018-05-01 Verizon Patent And Licensing Inc. Connection and traffic management in a multiple core network architecture
KR102458443B1 (en) * 2016-02-23 2022-10-25 삼성전자주식회사 A method and apparuats for charging usage of a radio resource in a wireless communication system
CN107302781B (en) * 2016-04-14 2020-01-21 中国移动通信有限公司研究院 Communication method and device based on dual-mode relay device, base station and terminal
US10833876B2 (en) * 2016-10-28 2020-11-10 Apple Inc. Protection of the UE identity during 802.1x carrier hotspot and Wi-Fi calling authentication
US11553561B2 (en) 2016-10-28 2023-01-10 Apple Inc. Protection of the UE identity during 802.1x carrier hotspot and wi-fi calling authentication
WO2018089442A2 (en) * 2016-11-09 2018-05-17 Intel IP Corporation Ue and devices for detach handling
US10440776B2 (en) 2017-03-17 2019-10-08 Harris Corporation Non-standard alternate protocol based satellite communications
KR102449988B1 (en) 2018-06-29 2022-10-05 삼성전자주식회사 Apparatus and method for data communication in wireless communication system
US11438422B2 (en) 2019-02-14 2022-09-06 Intel Corporation Establishing cloud-to-cloud access for internet of things (IOT) devices
CN110351729B (en) * 2019-07-15 2022-05-13 西安高新兴物联软件有限公司 Method, system, terminal and storage medium for automatically matching authentication parameters

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008151663A1 (en) * 2007-06-12 2008-12-18 Telefonaktiebolaget Lm Ericsson (Publ) Method and apparatuses for authentication and reauthentication of a user with first and second authentication procedures
WO2009002236A1 (en) * 2007-06-27 2008-12-31 Telefonaktiebolaget Lm Ericsson (Publ) A method and apparatus for enabling connectivity in a communication network
ES2574986T3 (en) * 2008-04-02 2016-06-23 Vodafone Group Plc Telecommunications network
PL2247144T3 (en) * 2009-04-28 2015-06-30 Koninklijke Kpn Nv Telecommunications network responsive to server-provided location information
CN102045691B (en) * 2009-10-10 2014-06-11 中兴通讯股份有限公司 Method and device for acquiring grouped identifiers of machine type communication (MTC) equipment
EP2520110A1 (en) * 2009-12-28 2012-11-07 InterDigital Patent Holdings, Inc. Machine-to-machine gateway architecture
CN102196436B (en) * 2010-03-11 2014-12-17 华为技术有限公司 Security authentication method, device and system
CN102215474B (en) * 2010-04-12 2014-11-05 华为技术有限公司 Method and device for carrying out authentication on communication equipment
US8995336B2 (en) * 2010-05-11 2015-03-31 Telefonaktiebolaget L M Ericsson (Publ) MTC service activation

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; System Improvements for Machine-Type Communications; (Release 10)", 3GPP STANDARD; 3GPP TR 23.888, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, no. V0.4.1, 3 June 2010 (2010-06-03), pages 1 - 53, XP050441503 *
ZTE: "Architecture for service control optimization", 3GPP DRAFT; S2-100087 ARCHITECTURE FOR SERVICE CONTROL OPTIMIZATION, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG2, no. Shenzhen; 20100118, 12 January 2010 (2010-01-12), XP050432715 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9755882B2 (en) * 2011-11-04 2017-09-05 Intel Corporation Small data techniques and configurations in a wireless communication network
US11251932B2 (en) 2011-11-04 2022-02-15 Apple Inc. Small data techniques and configurations in a wireless communication network
CN104104528A (en) * 2013-04-03 2014-10-15 株式会社日立制作所 Registration management device and registration management method for M2M platform
EP2890073A1 (en) * 2013-12-31 2015-07-01 Gemalto SA System and method for securing machine-to-machine communications
WO2015101451A1 (en) * 2013-12-31 2015-07-09 Gemalto Sa System and method for securing machine-to-machine communications
US9935954B2 (en) 2013-12-31 2018-04-03 Gemalto Sa System and method for securing machine-to-machine communications
GB2529391A (en) * 2014-08-12 2016-02-24 Vodafone Ip Licensing Ltd Machine-to-machine cellular communication security
US9992670B2 (en) 2014-08-12 2018-06-05 Vodafone Ip Licensing Limited Machine-to-machine cellular communication security
US11811740B2 (en) 2015-07-02 2023-11-07 Convida Wireless, Llc Content security at service layer
CN110213744A (en) * 2019-05-31 2019-09-06 恒宝股份有限公司 A kind of smart card realizes the method, apparatus and smart card of M2M business

Also Published As

Publication number Publication date
US20210185499A1 (en) 2021-06-17
US11706598B2 (en) 2023-07-18
US20240022885A1 (en) 2024-01-18
US20170311363A1 (en) 2017-10-26
US9736873B2 (en) 2017-08-15
US20130329653A1 (en) 2013-12-12

Similar Documents

Publication Publication Date Title
US11706598B2 (en) Interface of an M2M server with the 3GPP core network
TWI816160B (en) Device and method for enhancements to nas protocol to transmit small data over signaling plane
KR101929533B1 (en) System and method for sharing a common pdp context
JP6745231B2 (en) Service Capability Server (SCS) Terminated Short Message Service (SMS) System and Method
WO2018145056A1 (en) Securing communication of devices in the internet of things
US20120252518A1 (en) Network initiated triggering of an offline device
US9276806B2 (en) Failover recovery methods with an edge component
KR20150119420A (en) Charging architecture for a converged gateway
US20130324170A1 (en) Short messaging service (sms) over evolved packet core using wifi access
EP3285519B1 (en) Inter-user equipment (ue) transfer (iut) for collaborative sessions that include media session information
WO2017123938A1 (en) Integration of non-3gpp access in a 5g system user plane framework
JP6306630B2 (en) Privacy for subscriber subscribers
US20110069676A1 (en) Information service and event service mechanisms for wireless communications
US20150319587A1 (en) Short message service in prose

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11733731

Country of ref document: EP

Kind code of ref document: A1

DPE1 Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101)
NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 13806450

Country of ref document: US

122 Ep: pct application non-entry in european phase

Ref document number: 11733731

Country of ref document: EP

Kind code of ref document: A1